background preloader

Cybersafety educational games, videos and information for children: Cybersmart

Cybersafety educational games, videos and information for children: Cybersmart
Related:  Online Safety and Digital Citizenship

Nine Elements Nine Themes of Digital Citizenship Digital citizenship can be defined as the norms of appropriate, responsible behavior with regard to technology use. 1. 2. 3. 4. 5. 6. 7. 8. 9. Respect, Educate and Protect (REPs) These elements have also been organized under the principles of respect, educate and protect. Respect Your Self/Respect Others - Etiquette - Access - Law Educate Your Self/Connect with Others - Literacy - Communication - Commerce Protect Your Self/Protect Others -Rights and Responsibility - Safety (Security) - Health and Welfare If this was to be taught beginning at the kindergarten level it would follow this pattern: Repetition 1 (kindergarten to second grade) Respect Your Self/Respect Others Digital Etiquette Educate Your Self/Connect with OthersDigital Literacy Protect Your Self/Protect Others Digital Rights and Responsibility Repetition 2 (third to fifth grade) Respect Your Self/Respect Others Digital Access Educate Your Self/Connect with OthersDigital Communication

Cybersafety educational games and information for young children: Cybersmart Visit the Circus Roll up, roll up for the greatest show on earth...learn about online safety with Zippep and his circus friends. Have some fun! Have some fun in Silicon Deep with Hector and his friends. There’s lots of stuff to do to learn about being smart online. Hector's World And remember Cyber Safety - Internet Safety Tips To Stay Safe Online : InformED It's always good to be cautious while on the internet. There are people in the cyber world who want to do harm to you or your computer. These are some good tips to keep in mind while you are surfing: Be careful about what you put on the web. It's on there forever and can be used to trace back to you at any time. Keep track of who you interact with on the internet. Some people may not be who they seem to be. Know that privacy is just an illusion. Even personal information on social networks can be easily recovered by anyone. Don't open any links in emails or chat rooms that look suspicious or unfamiliar. Also, never open any strange files that your computer may have downloaded from an email or a website. The best way on the internet to keep in touch with friends, sharing pictures and memories, and meet new people is by using a social network. Some of the most popular social networks as of today are: It may be unnerving to hear this but you virtually have no privacy on a social network. You should:

Think The Digital Citizen To be a citizen, of a country brings certain rights and responsibilities.In Rome, a citizen was exempt some taxes, protected against certain punishments, empowered with rights like voting, making contracts, marriage and standing for office. But with these rights also came responsibilities. The citizen of Rome had to speak Latin, pay taxes, serve jury duty, be registered and identified by birth certificate and census. They also had to up hold social responsibilities and be virtuous. This is being a virtuous citizen. Recommendation: A couple of years ago, I had my attention drawn to a social networking page of a student. Recommendations Think about the information you are posting, what will it mean to an outsider viewing it? As a responsible cyber or digital citizen, we model respect for other people. Every social networking site, instant messaging tool, chatroom, wiki, blog and social media has a report abuse contact. Recommendations. Recommendation. Recommendations

Cybersmart Tagged What you do online could tag you for life This captioned film contains moving images, a sound track and dialogue. A full copy of the script, including scene descriptions, is provided in a separate file titled ‘Tagged film script’. Gold — WorldMediaFestival Silver — New York Festivals Winner – ATOM Awards When a group of high-school friends post a rumour about a rival it sparks a chain reaction that leaves no one untouched. Developed by the Australian Communications and Media Authority’s Cybersmart program, Tagged is recommended for use with students aged 14 and over. Tagged is supported by lesson plans and compelling character reflection interviews. Victoria Police - Online Safety Online Safety The Internet and social media are part of the lives of many people and provide them with the opportunity to meet and communicate with people from all over the world. However, online technology and new modes of communication have also been used by predators and sex offenders to exploit and harm children. While the Internet generally offers great opportunities for children to learn and play, there are some areas of cyberspace that are not appropriate. Steps for improving your child's safety Risk factors The following may be signs that your child has been targeted by an online predator: Advice for your children It is advisable to tell your children: Not to send a picture of themselves to someone they do not know.Never place a full profile and picture of themselves anywhere on the Internet. Further information ACORN does not accept reports relating to emergencies or online sex offences against children (including child exploitation material).

11 Tips For Students To Manage Their Digital Footprints - 11 Tips For Students To Manage Their Digital Footprints by Justin Boyle If you’ve scratched your head over suggestions to manage your “digital footprint,” you aren’t the only one. A surprisingly large percentage of people have never even heard the phrase, let alone thought about how to manage theirs responsibly. The Definition Of A Digital Footprint Simply put, a digital footprint is the record or trail left by the things you do online. Luckily for us all, most of the major sources of personal information can be tweaked so we share only certain things with the general public. If you want to show students their digital footprint (or take a peek at your own) the personal info search engine Pipl.com is a great resource. What To Tell Your Students About Monitoring Their Digital Footprints: 11 Tips 1. Let’s talk Facebook, shall we? 2. Then delete the ones you no longer use. 3. 4. 5. You may be surprised what you find. 6. 7. 8. That said, you don’t need 12. 9. 10. 11. Conclusion

stpatricksict - Learning Activities Skip to main content Get your brand new Wikispaces Classroom now and do "back to school" in style. guest| Join | Help | Sign In guest Join | Help | Sign In stpatricksict Home Turn off "Getting Started" Loading... Should you share that photo? Webonauts Internet Academy . Parents and Teachers| PBS KIDS GO! Webonauts Internet Academy is a web original game for PBS KIDS GO! that gives kids 8- to 10-year-old an opportunity to have some fun while exploring what it means to be a citizen in a web-infused‚ information-rich world. It is an engaging experience on its own but becomes all the more powerful when parents and teachers use game play as a springboard for conversations about media literacy and citizenship in the 21st Century. The Webonauts Internet Academy is a game about how to be safe and act respectfully online. Players create a customized space suit and complete a series of missions. The missions address key issues central to good citizenship: identity, privacy, credibility and web safety. Players also learn the importance of acting with respect both online and offline. At the end of the game, players graduate from the Webonauts Internet Academy and win a printable diploma. To help players get the most out of Webonauts Internet Academy‚ knowing some key terms will come in handy.

I am a digital citizen poster Manage your privacy and security – For everyone – Safety Center – Google Access your settings by clicking your name or picture in the right corner then clicking Account. At the top, click Security. In the Password box, click Setup next to “2-Step verification.” You will then see a step-by-step guide which will help you through the setup process. You’ll then be taken back to 2-step verification settings. You’re done!

Related: