Upload
elizkeren
View
435
Download
3
Embed Size (px)
DESCRIPTION
Citation preview
Should Teacher be Fired?
"teaching chitlins in the ghetto of Charlotte”
"I am teaching in the most ghetto school in Charlotte”
TO VOTE:RED X for NOGREEN CHECK for YES
In Cyberspace…
Don’t assume anything you send or post is going to remain private.
There is no changing your mind in cyberspace—anything you send or post will never truly go away.
Don’t give in to the pressure to do something that makes you uncomfortable, even in cyberspace.
Consider the recipient’s reaction. Nothing is truly anonymous.
Your Media is NEVER deleted!
Cambridge researchers posted pictures to sixteen websites, noting the direct URL to the image, and then deleted the original. They reopened the URLs over a period of 30 days to see whether the pictures were accessible and found that images were still visible on five sites at the end of that month. This is possible because the files remain in photo server caches of the underlying content delivery network (CDN) after they have been cleared from indices that provide data for dynamic pages (such as profiles) and search results. The terms of service for these sites indicate that deletion may not be immediate, with Facebook likening the process to putting a file in the Recycle Bin.
http://emergingtechnologies.becta.org.uk/index.php?section=etn&rid=14632
Way Back Machine
Social networks have been used to post content to embarrass or intimidate students, so it is important for learners to understand that the consequences of such actions may last even longer than they expected. Not only may content remain in caches and backups, but it can be copied to third party sites or be captured in archives without your knowledge or permission, such as the Wayback Machine.
Clean UP!
"I know for a fact that when a superintendent in Missouri was interviewing potential teachers last year, he would ask, 'Do you have a Facebook or MySpace page?' " said Todd Fuller, a spokesman for the Missouri State Teachers Association, which is warning members to clean up their pages. "If the candidate said yes, then the superintendent would say, 'I've got my computer up right now. Let's take a look.' "
Of those hiring managers who have screened job candidates via social networking profiles, one-third (34 percent) reported they found content that caused them to dismiss the candidate from consideration.
Specific Reasons for NOT hiring based on Digital Footprint found
40% - candidate posted provocative or inappropriate photographs or information
29% - candidate had poor communication skills
28% - candidate bad-mouthed their previous company or fellow employee
22% - candidate’s screen name was unprofessional
The POSTIVE side of Digital Footprints!
On the other hand, social networking profiles gave some job seekers an edge over the competition.
24% of hiring managers who researched job candidates via social networking sites said they found content that helped to solidify their decision to hire the candidate.
Why Employers Hired Candidates After Screening Online
50% Profile provided a good feel for the candidate’s personality and fit
39% Profile supported candidate’s professional qualifications
38% Candidate was creative 35% Candidate showed solid communication
skills 33% Candidate was well-rounded 19% Other people posted good references
about the candidate 15% Candidate received awards and
accolades
Student or teacher Facebook Post? You Decide…
“"Teaching in DCPS -- Lesson #1: Don't smoke crack while pregnant."
"you're a retard, but i love you.”
"I only have two feelings: hunger and lust. Also, I slept with a hooker. Be jealous. I like to go onto Jdate and get straight guys to agree to sleep with me."
"rocking out with some deaf kids. it. is. AWESOME."
Should Teacher be Fired?
"teaching chitlins in the ghetto of Charlotte”
"I am teaching in the most ghetto school in Charlotte”
Prosecutors Search Social Networking Sites!
Prosecutors use Facebook, MySpace photos
Students who made light of drinking received jail sentences for DUIDefense attorneys also use social networking sites to dig up dirt on
witnessesPROVIDENCE, Rhode Island (AP) -- Two weeks after Joshua Lipton
was charged in a drunken driving crash that seriously injured awoman, the 20-year-old college junior attended a Halloween party
dressed as a prisoner. Pictures from the party showed him in ablack-and-white striped shirt and an orange jumpsuit labeled "Jail
Bird.”
http://74.125.93.132/search?q=cache:SgDbAA0gzEoJ:freedom-school.com/reading-room/unrepentant-on-facebook-expect-jail-time.pdf+Unrepentent+on+Facebook&cd=1&hl=en&ct=clnk&gl=us&client=firefox-a
Facebook is public
“When you access Facebook from a computer, mobile phone, or other device, we may collect information from that device about your browser type, location, and IP address, as well as the pages you visit.”
What is automatically public?
Certain categories of information such as your name, profile photo, list of friends and pages you are a fan of, gender, geographic region, and networks you belong to are considered publicly available, and therefore do not have privacy settings.
You can limit the ability of others to find this information on third party search engines through your search privacy settings.
Facebook Collaborates with 3rd party sites to store YOUR information
We may institute programs with advertising partners and other websites in which they share information with us:
- We may ask advertisers to tell us how our users responded to the ads we showed them. This data sharing, commonly known as “conversion tracking,” helps us measure our advertising effectiveness and improve the quality of the advertisements you see.
- We may receive information about whether or not you’ve seen or interacted with certain ads on other sites in order to measure the effectiveness of those ads.
FB collects Information from your friends about you!
“We may collect information about you from other Facebook users, such as when a friend tags you in a photo or video, provides friend details, or indicates a relationship with you. You can limit who can see that you have been tagged in a photo or video – which we refer to as photos or videos “of me” – in your privacy settings.”
How Facebook Shares your information
When you make a payment. When you invite a friend to join When you choose to share your
information with marketers. To help your friends find you. To give search engines access to
publicly available information. To help improve or promote our service. To provide you with services. To advertise our services. To respond to legal requests and
prevent harm. To offer joint services.
Facebook Says: No Security is Perfect
We cannot control the actions of other users with whom you share your information.
We cannot guarantee that only authorized persons will view your information.
We cannot ensure that information you share on Facebook will not become publicly available.
We are not responsible for third party circumvention of any privacy settings or security measures on Facebook.
You can reduce these risks by using common sense security practices such as choosing a strong password, using different passwords for different services, and using up to date antivirus software.
What Are Your Digital Footprints?
Survey Social Networking Sites: Facebook,
MySpace Email Twitter Webpages Snapfish, Kodak, Flick YouTube
Google Yourself
What is YOUR digital footprint?
http://dsc.discovery.com/convergence/koppel/interactive/interactive.html
Hints and Tips for Social Networkking
Weak Passwords Get rid of your year on your birth
date (in profile) No children’s names (no tags,
nothing) Do not mention your future plans
(esp. away form home) Remove yourself from public search
Clean Up Social Networking Site1. Take control of your photos. Your personal and professional life are
becoming one, largely due to Facebook. Go through what you have on your social network & untag yourself in photos that an employer might find inappropriate.
2. Set privacy settings. You have less reason to worry if employers can’t access your digital life.
3. Post photos that promote you as a professional. If you have photos from volunteering, studying abroad, working a job, giving a presentation, or any other semi-professional event, post them. They go a long way to help counteract other photos that might negatively impact your image.
4. Put up a clean profile photo of yourself. Even if you got a lot of compliments on your stripper Halloween costume, a profile picture that isn’t associated raucous college partying means a lot to people in hiring positions.
5) Stay active online. By commenting on blogs and forums, updating your profiles, and even creating your own site you can become much more visible and credible online. This gives the people who search you a much more comprehensive picture of who you are and allows you to highlight the good and bury the bad
6. Be mindful of who you accept as a “Friend.” Poor choices could reflect badly on you as a professional. Make sure to monitor their comments on your sites as well.
Set up an Alert to Monitor Yourself
Facebook Privacy Scan http://www.reclaimprivacy.org/facebook
Google Alerts http://google.com/alerts
Google Profile http://google.com/profile
Vanish http://vanish.cs.washington.edu/index.ht
ml
Life Consequences: Sexting Six teens face child porn (13 to 15) charges
after being caught "sexting" each other. Criminal Charge!
IN PA, 3 girls (12, 12, 16) charged with child pornography for sexing. Picture of them in bras.
15% of teenagers have risqué photos of themselves or their friends on their cell phones.
1 in 5 sext recipients report that they have passed the images along to someone else http://www.cnn.com/video/#/video/bestoftv/2009/01/15/pn.sexting.te
ens.cnn
"If you take a picture, you can be accused of producing child pornography; if you send it to somebody, you can be accused of distributing child pornography; and if you keep a picture, you can be accused of possessing child pornography. Anywhere along this chain of transmission of the images, you can be charged as a registered sex offender."
-Parry Aftab, an Internet privacy and security lawyer.
Underage On Facebook
750,000 kids between the ages of 8 and 12 have set up a profile on the big social-networking sites
http://www.theglobeandmail.com/news/technology/article709704.ece
Student’s lack of concern over privacy and permanent record
Research shows that issues of privacy and safety are not at the forefront of younger users' minds.
41% of children aged 8 to 17 who had a visible profile had them set so they were open and accessible to anyone. (Office of Communications in GB)
Younger adults and children are much more likely to share sensitive information After weeks of butting heads with his coaches, Taylor, 17,
logged on to Facebook from home Jan. 3. He typed his frustrations for the online world to see: "I'ma kill em all. I'ma bust this (expletive) up from the inside like nobody's ever done before.”
(USA Today, Jan 2010) Taylor's profile was public, so there were no restrictions
on who could view it.
Parents need education too!
Taylor’s family argued that students and parents aren't properly educated or warned that what they write online can have consequences in the classroom.
Teens Encounter both pro-social & anti-social behavior while gaming
78% report they frequently see other players being kind or helpful to those who are gaming
63% report seeing or hearing “people being mean or overly aggressive while playing”
49% report seeing or hearing “people being hateful, racist, or sexist” while playing
Survey Students
Find out what websites they frequent Ask what they know about digital
safety? Do they give out their real name,
birthday, age, gender, address, location, school?
Do they answer emails, chats, prompts from strangers?
Do they use websites that are restricted to 13+?
Help them set up a profile
For K-4, use younger social networking sites Club Penguin KidBlog Edublogs Edmodo Woogie WorldMake up namesNo identifying informationSelect most private settingsNo posting pictures or videos of themselves
(use Avatars instead such as http://voki.com )
Parent Information Nights Go over cybersafety at home
Computers NOT in bedroom Set up accounts with children Watch kids online to see where they go Never talk to strangers online No unmonitored chatrooms No sharing ANY personal information online▪ Phone, address, location, vacations, full names, school, or
names of organizations Talk with kids often about what they are doing online Post rules next to computer
Suggest resources such as http://www.netsmartz.org/index.aspx
As of 2010…
1 in 5 middle school students have either participated or been the victim of cyberbullying
“The girl’s parents, wild with outrage and fear, showed the principal the text messages: a dozen shocking, sexually explicit threats, sent to their daughter the previous Saturday night from the cellphone of a 12-year-old boy. Both children were sixth graders at Benjamin Franklin Middle School in Ridgewood, N.J. “
Punish him, insisted the parents.
“I said, ‘This occurred out of school, on a weekend,’ ” recalled the principal, Tony Orsini. “We can’t discipline him.”
Cyberbullying Most Popular in…
Online gaming and virtual worlds Chat/discussion rooms Social Network Sites Instant Messengers Text messages Video sharing sites like Youtube
How does Cyberbullying differ from Traditional Bullying?
Do not always know who is the perpetrator because you can “hide” online
Easier to be cruel and nasty when you don’t have to face the victim
Less chance of an adult finding out Viral
EVERYONE knows about it!
Negative Effects of Cyberbullying
Depression, sadness, anger, frustration
Embarrassed to go to school Low self-esteem Problems with Parents/Family School Delinquencies Suicidal Students claim to have both physical
and emotion problems as a result.
Warning Signs…
If a child suddenly stops using their digital equipment (cell phone, computer)
If a child is nervous or jumpy when email or text messages arrives
Uneasy about going to school Suddenly angry, depressed, frustrated Withdraws from friends Does not want to talk about their
digital experiences
Warning Signs…for a Cyberbully
Switches windows or logs out of the computer when you come around
Has multiple online accounts Gets upset when their computer or
phone privileges are taken away
The Law: Cyberbullying
No NATIONAL Law, it is State by State. In All Cases
Both the perpetrator and victim must be under the age of 18.
The more repeated the communications are, the greater the threats (or enlarging this to include third-parties) and the more dangerous the methods, the more likely law enforcement or legal process needs to be used.
If personal contact information is being shared online, this must be treated very seriously.
The Law in Michigan
No State Law Require schools to have their own
laws and sanctions. All State Cyberbullying
Laws Download
Examples of “Threats” Repeated e-mails or IMs Following the child around online, into chat rooms, favorite Web
sites, etc. Building fake profiles, Web sites or posing as your child’s e-mail or
IM Planting statements to provoke third-party stalking and
harassment Signing the child up for porn sites and e-mailing lists and junk e-
mail and IM. Breaking in to their accounts online Stealing or otherwise accessing their passwords
Posting images of the child online (taken from any source, including video and photo phones) Posting real or doctored sexual images of the child online
Sharing personal information about the child Sharing intimate information about the child (sexual, special
problems, etc.) Sharing contact information about the child coupled with a sexual
solicitation (“for a good time call …” or “I am interested in [fill in the blank] sex…”)
Reporting the child for real or provoked terms of service violations (“notify wars” or “warning wars”)
Encouraging that others share their top ten “hit lists,” or ugly lists, or slut lists online and including the child on that list.
Posting and encouraging others to post nasty comments on the child’s blog.
Threats…
Hacking the child’s computer and sending your child malicious codes. Sending threats to others (like the president of the United States) or
attacking others while posing as the child. Copying others on the child’s private e-mail and IM communications.
Posting bad reviews or feedback on the child without cause. Registering the child’s name and setting up a bash Web site or profile. Posting rude or provocative comments while posing as the child (such
as insulting racial minorities at a Web site devoted to that racial minority).
Sending spam or malware to others while posing as the child. Breaking the rules of a Web site or service while posing as the child. Setting up a vote for site (like “hot or not?”) designed to embarrass or
humiliate the child. Masquerading as the child for any purpose. Posting the child’s text-messaging address or cell phone number
online to encourage abuse and increase the child’s text-messaging or cell phone charges.
COPPA
If a children’s information is posted online, and they are under the age of thirteen, notify the Web site or online service that the children are under thirteen and that COPPA (the Children’s Online Privacy Protection Act) requires that they remove the information immediately.
If they don’t respond right away, contact [email protected] privacy [at] wiredsafety.org or the FTC directly, at http://www.ftc.gov/.
CyberLaw Enforcement http://cyberlawenforcement.org/
Be a Proactive Teacher
Talk about cyberbullying and what it is and why it is not tolerated.
Send home information to parents reminding the monitor their child’s online and mobile activities.
Review the school’s policy on bullying and harassment
Talk about consequences for bullying behavior