Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

H:\Esafety\Esafety Staff Training 100609\E Safety Training

670 views

Published on

Published in: Technology
  • Login to see the comments

  • Be the first to like this

H:\Esafety\Esafety Staff Training 100609\E Safety Training

  1. 1. E-safety Training 10 th June 2009
  2. 2. The Benefits of ICT <ul><li>Shopping </li></ul><ul><li>Booking holidays </li></ul><ul><li>Banking online </li></ul><ul><li>Use of mobile phones </li></ul><ul><li>Email and communication </li></ul><ul><li>Information at our fingertips </li></ul>
  3. 3. The divide of the generations <ul><li>Research </li></ul><ul><li>Email </li></ul><ul><li>Shopping </li></ul><ul><li>Interactive chat </li></ul><ul><li>Instant messaging </li></ul><ul><li>games </li></ul>Digital Immigrants Digital Natives
  4. 4. Internet access <ul><li>Home computer </li></ul><ul><li>Laptop </li></ul><ul><li>Mobile phone </li></ul><ul><li>Wii </li></ul><ul><li>Nintendo DS </li></ul><ul><li>Other gaming device </li></ul><ul><li>Friends house </li></ul>
  5. 5. The risks <ul><li>Exposure to inappropriate material </li></ul><ul><ul><li>Pornographic, hateful, violent in nature </li></ul></ul><ul><li>Inappropriate or illegal behaviour </li></ul><ul><ul><li>Gangs can form online </li></ul></ul><ul><ul><li>Cyber bullying </li></ul></ul><ul><ul><li>Criminal activity </li></ul></ul><ul><li>Physical and sexual abuse </li></ul><ul><ul><li>Sexual grooming </li></ul></ul><ul><li>Obsessive use of the Internet </li></ul><ul><li>Copyright Infringement </li></ul><ul><ul><li>Music, homework! </li></ul></ul>
  6. 6. The debate SWGFL presentation ESafety conference 2008
  7. 7. KS1 and KS2 <ul><li>Walled Garden approach </li></ul><ul><ul><li>Filtering </li></ul></ul><ul><ul><li>Restricted use of web 2 technology </li></ul></ul><ul><ul><ul><li>Merlin </li></ul></ul></ul><ul><ul><ul><li>Class blogs </li></ul></ul></ul><ul><ul><ul><li>School tube </li></ul></ul></ul>What is web 2 technology? Web 2.0 concepts have led to the development and evolution of web-based communities, hosted services , and applications ; such as social-networking sites , video-sharing sites , wikis , blogs , and folksonomies . Wikipedia May 2009
  8. 8. Filtering SWGFL presentation ESafety conference 2008
  9. 9. Sites often used by children <ul><li>Networking sites </li></ul><ul><ul><li>www.myspace.com </li></ul></ul><ul><ul><li>www.piczo.com </li></ul></ul><ul><ul><li>www.bebo.com </li></ul></ul><ul><li>Instant messaging sites </li></ul><ul><ul><li>www.msn.com </li></ul></ul><ul><ul><li>www.hi5.com </li></ul></ul><ul><li>Chat rooms </li></ul><ul><ul><li>www.habbohotel.co.uk </li></ul></ul><ul><ul><li>www.penguinchat.com </li></ul></ul>
  10. 10. Scenarios <ul><li>How would we react to these scenarios if we were presented by them? </li></ul><ul><li>Would we class them as: </li></ul><ul><li>Red – Danger </li></ul><ul><li>Amber – Cause for concern </li></ul><ul><li>Green – Nothing to worry about </li></ul>Provided by LGfL at ESafety conference 2008
  11. 11. Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’.
  12. 12. Lois - R ed A mber G reen <ul><li>There is little or no danger to the young person - the activity is one they may continue with. </li></ul><ul><li>Encourage safe behaviour - the young person should be supported in their e-safety activity. They should stop the activity, or take no further action. </li></ul><ul><li>Escalate </li></ul><ul><li>- to the service provider! </li></ul><ul><li>- report abuse! </li></ul><ul><li>- involve LA support services. </li></ul>
  13. 13. Lois’s friend offers to share their Instant Messenger (like MSN) contacts. Lois is very pleased because she now has 150 ‘friends’. Lois’s ‘friends’ have been collected by sharing address books. She only knows about one third of the people in her contact list. She has used the features in MSN to sort her ‘friends’ into groups – school, home friends, family, holiday mates. She also has a group for ‘friends of friends’ i.e. internet strangers. She does not give out any personal details to these people. She is happy to chat online with friends of friends, but nothing more. She does not use her web cam when she talks to this group.
  14. 14. James is 7 years old. He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses?
  15. 15. James <ul><li>R, A or G? </li></ul><ul><li>What is the danger? </li></ul><ul><li>What are you worried about? </li></ul>
  16. 16. James is 7 years old. He’s in a chat room – a pizza parlour in a ‘virtual’ world. Someone is ‘talking’ to him and asks if he wants to chat ‘outside’ and can they swap email addresses? James is sitting with his Mum; they are using the internet together. James’ Mum explains he should never give out his private information to anyone, and, if he is not sure, he should talk to a grown up at home or at school.
  17. 17. Jack has been talking to an online ‘friend’ for some time. The ‘friend’ seems really nice and they have loads in common. They’ve sent Jack a photo of themselves. It’s the holiday and they ask to Jack to meet in the park.
  18. 18. Jack <ul><li>R, A or G? </li></ul><ul><li>What question do you want to ask? </li></ul><ul><li>What else do you want to find out? </li></ul>
  19. 19. Jack has been talking to an online ‘friend’ for some time. The ‘friend’ seems really nice and they have loads in common. They’ve sent Jack a photo of themselves. It’s the holiday and they ask to Jack to meet in the park. Jack likes his friend and would like to meet him. He tells him he’ll see him on Saturday and he’ll be bringing his dad. His friend says ‘OK’ and that his dad will be there too. They have a good kick about in the park and the dads find a coffee stall!
  20. 20. For a while Sophie has been chatting online, in secret, with someone older than her. At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online. But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’.
  21. 21. Sophie <ul><li>R, A or G? </li></ul><ul><li>Who will help Sophie? </li></ul><ul><li>What action would you take? </li></ul>
  22. 22. For a while Sophie has been chatting online, in secret, with someone older than her. At first he seemed really nice and appeared to understand her better than her family. She knew it was silly, but she found it easy to tell him lots of personal things, and she was pleased to have an ‘older boyfriend’ online. But now he is sending her very personal and ’explicit’ messages which make her feel uncomfortable and uneasy about the ‘relationship’. Sophie doesn’t go online for a few days. She doesn’t talk to anyone: she’s too embarrassed to talk to anyone face to face. She remembers a lesson at school where she learnt about a red button, so she looks in MSN and finds it. It says ‘report abuse’. She types all the details into the form. She feels better for having told someone. She doesn’t talk to her ‘boyfriend’ again.
  23. 23. What can we do to help? <ul><li>Keep up to date with e-safety </li></ul><ul><li>Try out some of the new technologies for ourselves </li></ul><ul><li>Keep telling children how to be safe online </li></ul><ul><li>Talk to them about any concerns they may have </li></ul><ul><li>Talk to the E-Safety Coordinator if a real issue occurs </li></ul>
  24. 24. School E-Safety Policy <ul><li>School E-Safety Policy </li></ul><ul><ul><li>Use of personal equipment </li></ul></ul><ul><li>Staff and Volunteer Acceptable user policy </li></ul><ul><ul><li>To be signed by all staff </li></ul></ul><ul><li>Pupil acceptable user policy </li></ul><ul><ul><li>To be signed at school </li></ul></ul>
  25. 25. ESafety awareness day <ul><li>June 23 rd 2009 </li></ul><ul><ul><li>Internet safety assembly </li></ul></ul><ul><ul><li>Classroom discussion </li></ul></ul><ul><ul><li>Signing of e-safety agreement </li></ul></ul><ul><ul><li>Information to take home </li></ul></ul><ul><ul><li>Time in the morning and afternoon for parents to come in and learn about ESafety </li></ul></ul>
  26. 26. Glossary <ul><li>Web 2 technology is a phrase used to describe the applications many people are using the Internet today. </li></ul><ul><li>Hosted Services – services such as our web site where the site is hosted over the Internet rather than on our server </li></ul><ul><li>Social Networking – facebook, bebo, twitter are online communities of people with similar interests </li></ul><ul><li>Video-sharing sites – such as utube, schoolstube, teacher tube are a way to upload and watch video </li></ul><ul><li>Wiki - A wiki is a collection of web pages designed to enable anyone with access to contribute or modify content </li></ul><ul><li>Blog - A blog (a contraction of the term weblog ) is a type of website, usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. </li></ul><ul><li>Folksonomy - Folksonomy (also known as collaborative tagging, social classification, social indexing, and social tagging) is the practice and method of collaboratively creating bookmarks and tags to annotate and catagorise content. A bit like a website of favourites. Sites such as www.delicious.com </li></ul>

×