eSafety - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

eSafety

Description:

Embrace new technologies talk to kids and find out how THEY use technology! ... mobile phone images, deleted work data, borrowed identity and chat-room ... – PowerPoint PPT presentation

Number of Views:51
Avg rating:3.0/5.0
Slides: 11
Provided by: keithf6
Category:

less

Transcript and Presenter's Notes

Title: eSafety


1
eSafety Cyber BullyingKeith Fermor
  • Technical Forum
  • 20th November 2008

2
Anti-Bullying Week17th 21st November 2008
  • Being different, Belonging together
  • an opportunity to recognise value difference
    and to understand that despite being different,
    be it due to race, gender, height, appearance,
    disability, we can all work well and belong
    together

3
Paths (a few) to Cyber Bullying
Give personal details
Share data
Unsolicited calls
Threats
Adulterate images
Chat rooms
Share data
Video recording
bullying
Impersonation
Display abuse
Threats
Destroy work
Images
Share data
Give personal details
Impersonation
4
Key Issues
  • Bully assumes anonymity
  • Uncertain end
  • Look - no one is safe
  • Lots of people - potentially whole world
  • You cannot see the impact
  • Its a quick fix action
  • Non-bullies get pulled in
  • Given as a throw away gesture

5
What can WE do?
  • Ensure Cyber Bullying is in policies
  • Establish boundaries security access
  • Educate by spreading the word
  • Effective monitoring action protocol
  • Embrace new technologies talk to kids and find
    out how THEY use technology!

6
What about Kirklees?
  • Examples of pupil bullying by emails, mobile
    phone images, deleted work data, borrowed
    identity and chat-room insults
  • Group discussion of examples
  • How to prepare for action
  • Determine degree of bullying
  • Acting on reported abuse

7
Example 1 (from LSCB meeting of YHGfL)
  • Young boy runs into girls changing rooms, quickly
    taking snaps with his mobile before running out
    again.
  • What could be done to prevent this?
  • How serious is this event?
  • What happens next?
  • List some assumptions

8
Example 2
  • A student complains that their work has
    disappeared. Unfortunately, you check and agree
    that all of their work to date has been deleted.
  • How could you have prepared for this?
  • What is the severity of this action?
  • Possible actions to take next?

9
Example 3
  • A pupil receives abusive emails through Digital
    Brain from another pupil who denies wrongdoing
    and a parent remonstrates with the school.
  • Could this have been prevented?
  • Is it a serious occurrence?
  • How can we stop it from happening again?

10
Example 4
  • One pupil types an abusive comment on their
    computer display, shows it to another pupil, then
    erases it but Securus spots it!
  • How much monitoring is necessary or sensible in
    order to catch this action?
  • What can ICT do to help stop this?
  • Are there any steps to take now?
Write a Comment
User Comments (0)
About PowerShow.com