background preloader

Cyberbully PSA

Cyberbully PSA

Protecting personal information | Office of the Children's eSafety Commissioner Scams are often sent via email but can also be sent by instant messaging and SMS. According to the Australian Competition and Consumer Commission’s (ACCC) SCAMwatch website anyone can fall victim to a scam. Scams succeed because they look like the real thing and scammers manipulate people into responding. Scams can appear to come from authoritative sources, like a well-known bank or mobile phone provider. They may make people fearful that they will miss out on a special offer, or feel ashamed of themselves for refusing to help a person or group in need. If in doubt about the legitimacy of a website, call the organisation it claims to represent.

Frequently Asked Questions about Copyright and Fair Use What is fair use? The Copyright Act gives copyright holders the exclusive right to reproduce works for a limited time period. Fair use is a limitation on this right. Fair use allows people other than the copyright owner to copy part or, in some circumstances, all of a copyrighted work, even where the copyright holder has not given permission or objects. How does fair use fit with copyright law? Copyright law embodies a bargain. However, copyright law does not give copyright holders complete control of their works. By carving out a space for creative uses of music, literature, movies, and so on, even while the works are protected by copyright, fair use helps to reduce a tension between copyright law and the First Amendment's guarantee of freedom of expression. How does the court know if a use is fair? Whether a use is fair will depend on the specific facts of the use. These factors are guidelines, and they are not exclusive. What has been recognized as fair use?

About Creative Commons Licenses: creativecommons.org Our public copyright licenses incorporate a unique and innovative “three-layer” design. Each license begins as a traditional legal tool, in the kind of language and text formats that most lawyers know and love. We call this the Legal Code layer of each license. But since most creators, educators, and scientists are not in fact lawyers, we also make the licenses available in a format that normal people can read — the Commons Deed (also known as the “human readable” version of the license). The final layer of the license design recognizes that software, from search engines to office productivity to music editing, plays an enormous role in the creation, copying, discovery, and distribution of works. Searching for open content is an important function enabled by our approach. Taken together, these three layers of licenses ensure that the spectrum of rights isn’t just a legal concept.

Excellent Video Clips on Plagiarism to Share with Your Students 1- What is Plagiarism 2- A Quick Guide to Plagiarism 3- Plagiarism: a film by Murdokh 4- Avoid Plagiarism in Research papers with paraphrases and quotations 5- Before he cheats: A teacher parody 6- 10 types of plagiarism Identity Theft Methods According to the Federal Trade Commission (FTC), identity thieves can obtain information by rummaging through trash or stealing from purses, wallets, mailboxes, or homes.[1] They may also use electronic methods, such as those listed below. Phishing relies on pop-ups, spam, and websites that look authentic to obtain personal information, such as log-in information and credit card numbers. Pharming uses malicious code to redirect users to fraudulent sites where hackers can access their personal information. These scams are sometimes accomplished with the use of malware (software designed to damage computers). Once identity thieves obtain a victim’s personal information, they may use it to run up charges on credit cards, open additional accounts, take out loans, lease property, or apply for a driver’s license. Protecting Yourself The number one rule when it comes to protecting yourself from identity theft is pay attention! Responding to Identity Theft

4 Ways for Teachers to Stay Safer Online- NetSafe Utah 1) Acceptable Use Policies (AUP) AUP's are "contracts" that outline how students can use the technology, what they cannot do with it and the consequences for violating the policy. These should include school web pages and the content that is allowed on them. AUPs should be signed by an authorized representative of the school, students and parents so that all concerned parties are aware of the policy. 2) No Student Names It is recommend that when referring to students on a web page that either their names not be used or only their first names be posted. 3) Student Pictures You are encouraged to post student work that may include student pictures; however, you should get written permission to post student pictures and work before placing it onto the web. 4) School or Classroom Web Pages Made available with permission of Stevens Institute of Technology; the Trustees of the Stevens Institute of Technology, Hoboken, NJ 07030. Learn More About These Risks NetSafe Pledges Additional Resources:

NetSmartz Teens Presentation Title CloseX About Us Donate MissingKids.com NetSmartzKids.org NSTeens.org Language: Login Register Teens Presentation Download Presenter's Guide Learn Teach Watch About Us | Contact Us | Legal Information | Site Map Copyright © 2001-2017 National Center for Missing & Exploited Children.

Video Games Play May Provide Learning, Health, Social Benefits, Review Finds WASHINGTON — Playing video games, including violent shooter games, may boost children’s learning, health and social skills, according to a review of research on the positive effects of video game play to be published by the American Psychological Association. The study comes out as debate continues among psychologists and other health professionals regarding the effects of violent media on youth. An APA task force is conducting a comprehensive review of research on violence in video games and interactive media and will release its findings in 2014. “Important research has already been conducted for decades on the negative effects of gaming, including addiction, depression and aggression, and we are certainly not suggesting that this should be ignored,” said lead author Isabela Granic, PhD, of Radboud University Nijmegen in The Netherlands. The article will be published in APA’s flagship journal, American Psychologist.

What is Cyberbullying Cyberbullying is bullying that takes place using electronic technology. Electronic technology includes devices and equipment such as cell phones, computers, and tablets as well as communication tools including social media sites, text messages, chat, and websites. Examples of cyberbullying include mean text messages or emails, rumors sent by email or posted on social networking sites, and embarrassing pictures, videos, websites, or fake profiles. Why Cyberbullying is Different Kids who are being cyberbullied are often bullied in person as well. Cyberbullying can happen 24 hours a day, 7 days a week, and reach a kid even when he or she is alone. Effects of Cyberbullying Cell phones and computers themselves are not to blame for cyberbullying. Kids who are cyberbullied are more likely to: Use alcohol and drugs Skip school Experience in-person bullying Be unwilling to attend school Receive poor grades Have lower self-esteem Have more health problems Frequency of Cyberbullying

Digital Footprint Video Tap here for our Free App! Get all our media picks, personalized for your kids. No thanks Jump to navigation Discover the best apps, games, and websites and learn best practices forteaching with technology. Mute Current Time 0:00 Duration Time 1:19 Loaded: 0% Progress: 0% Stream TypeLIVE Remaining Time -0:00 Playback Rate Chapters Chapters descriptions off, selected Descriptions subtitles off, selected Subtitles captions settings, opens captions settings dialogcaptions off, selected Captions This is a modal window. Educator video Digital Footprint Video Discussion Guide Find Videos Digital Citizenship All Best Practices Curriculum Lessons in Action Teaching Strategies Webinar ArchiveAbout Our Resources Tech Integration All Best Practices Lesson in Action Teaching Strategies Tech 101 Webinar ArchiveAbout Our Resources More Digital Citizenship Curriculum Videos Pages Browse our library of reviews Now playing and coming soon Browse all reviews See what our editors recommend What we love Browse more of what we love

Related: