SUP229S+How+to+Promote+Safe+and+Responsible+Cyber+Behavior+-+Best-Practice+Guidelines+and+Materials

Addressing C3: CyberEthics, CyberSafety and CyberSecurity

Davina Pruitt-Mentle, Ph.D. (ETPRO) Portia Pusey

The ISTE National Educational Technology Standards (NETS*S) and Performance Indicators for Students (handout)

Over half educators didn't know how the school or district was informing students about protecting against, identifying individuals

75% of educators were not comfortable about giving students advice about cyberbullying

90% of educators received less than 6 hours of C3 PD

Educators and Tech Coordinators preferred in-house training. Possible in-service to go with online supplementation. PD for teachers is a must!

IT Departments are not the Silver Bullet. They don't have a solution or technological "quick fix"

Recommendations in the handouts

Informal settings (Cubs, Scouts, Brownies etc.) are good places to expand the expression of C3. PAC meetings are another way to give some knowledge to the parents.

Educators not sure who should teach the C3 material...many feel uncomfortable

Sexual predation is still an issue however cyber bullying and harassment are bigger issues online

Making connections online that lead to offline contact are not inherently dangerous

Kaiser Family Foundation Generation M2

8-18yr olds average 7:38 per day using entertainment media and due to media multitasking they get over 10:45 into that 7:38

Kids spend more time doing other things on their cell phones than talking

1/3 of kids in that age group have the internet in their bedroom

a single computer in the household in a single location is a thing of the past

Survey showed that when the parents don't set limits, students spend less time on the media

99% of The Dirtiest Web Sites listing has Mal-ware, viruses, spyware etc, The list means dirty as in adding Mal-ware etc. not porn or sex necessarily

Youth needs to be constantly engaged in dialog and always be willing to talk to them about difficult issues, challenges or content they face online.

NIST - NICE program this fall

What ever you use has to be positive message based. Protect the privacy of others.

Cyberbullying Research Center for good research on the topic

Olweus Bullying Prevention Program - the model for this information

Stop Cyberbullying Now - another good resource

The Kind Campaign - www.kindcampaign.com

Need to be Proactive against cyberbullying
 * 1) Positive behaviour
 * 2) Proactively Monitor - ask to see accounts and websites. Do searches for child's name, screen name, friends names, school, clubs etc.. Check cell phone logs and stored photos
 * 3) Block It - use the block settings on e-mail, web browsers etc.
 * 4) Document it - list web addresses, e-mails, dates and screenshots
 * 5) Report it - local law enforcement, cybertipline, ISP of internet or cellphone provider

Sexting - Pew Internet and American Life Project (Teens and Sexting)

Teens who pay their own phone bills are more likely to send sexts

Boys are more likely to share sexts received rather than girls who would keep it private

Photograph - a film about sexting and cyberbulling - a very powerful video with all the correct steps in the dialog of what happened www.cybersafekids.com.au

KnowWhereTheyGo.org Digital Dossier

Online Reputation Management and Monitoring (ORM) - on wikipedia
 * 1) Unbelievable the amount of information that is kept on a person through various sites
 * 2) Don't post birth-date, SIN, Mother's Maiden name or passwords - pretty much everything else can be found

Google Hacking for webcams and finding out where are live ones

Search well and search often for information about yourself

Set up alerts (google alerts) etc to manage ORM Board Tracker MonitorThis Reputation Defender

http://lifehacker.com/357460/manage-your-online-reputation

Spokeo - e-mail searches

Digital Footprints vs. Digital Fossils All Digital Media becomes a Digital Fossil WayBack Machine (http://waybackmachine.org) for archive data

HR and colleges use various sites to search for potential hires or students

Microsoft/Cross-Tab for information on data mining by HR and Colleges/Universities

Top 10 Security Need to Know
 * 1) Limit personal info in e-mail
 * 2) back-up files
 * 3) passwords strength
 * 4) watch out for phishing, pharming, social engineering schemes/ recognize hoaxes
 * 5) determine if a website is secure (https and padlocks on browsers)
 * 6) install/enable e-mail filter and pop up blockers
 * 7) use/install a firewall and anti-virus protection
 * 8) use/install anti-spyware and know how to check for spyware-malware-adware
 * 9) recognize risks in wireless environments
 * 10) review your annual credit report