You are on page 1of 14

Ryan Martinez

Carrie Lane
Sarah Hunt
Helene Browne
Becky Roudebush

1. Identity Safety (Helene Browne)


• Identity Safety is the ability to keep individual pieces
of your identity either online or offline in applications for
credit cards, wireless services, retail credit, utilities, check
reorders, mortgage loans, auto loans, and payday loans safe
so that your information can't be used in a fraudulent or
malicious manner.

• Identity Safety Week 2

• General Questions

• On the list of events, how many might apply to you?


10 events out of the 21 would apply to me.

• Of the events on that list, which seem like justifiable


losses of privacy, and which do not seem justified? For
example, are the advantages of photo radar (10:30 AM)
worth the loss of privacy it involves?
The events that are justifiable losses include the use of a bank
machine at school - system records details of transactions, cameras
overhead or in machine record your behavior, enter school - cameras
record your entry into the building, return to school - card records your
return, and enter a doctor’s office - cameras monitor you and record the
time you come in. These are all actions that are for our protection, not to
impede on our privacy. Unjustifiable losses include sending personal e-mail
to older sister at work - this can be read by sister’s employer; simple
deletion does not erase it from the computer's hard drive, return a book
you bought yesterday. For the return you are required to fill out a form
that asks for your phone number and the number on your driver’s license,
drive car to school - your geo-positioning device plots your route to school
and records your vehicle location at all times; radar cams along the way
record your speed and will have a speeding ticket sent to your home
address if you drive above the legal limit, and checking your e-mail - even
after you delete an e-mail, it leaves a digital “print” – even after you empty
your trash the hard drive “prints” are still accessible and could be tracked
down. These actions are just unnecessary ways of collecting our personal
data.

• Give two examples of personal information that may be


collected automatically when you visit a Web site.
1) your email address
2) password information

• Read the list of ways in which we choose to give up


personal information online. How many of these have you
responded to? (purple=did not respond, red=did respond)
o Fill out a registration form to join an online community
o Create a personal profile to meet other kids with similar
interests
o Take an online personality test or I.Q. quiz
o Fill out an online marketing survey that promises points
for participating
o Fill out an entry form for an online contest
o Fill out a registration form for downloading programs,
games or plug-ins
o Send an e-card
o Subscribe to a newsletter
o Take advantage of “free stuff” being offered – such as
audio clips, discount coupons from online stores or promotional
screen-savers
• How important is privacy to you? If privacy is a concern,
what are some specific aspects of your privacy that you’re
worried about?
Privacy is very important to me, however I do understand that when I
join a social website or sign the "terms of agreement" to
purchase something online that privacy is relinquished. If I don't
trust the site then I just don't use it.

• Discuss why this is important to teach your students


• Teaching my students about identity safety is important to me
because children are very trustworthy and sometimes that trust is
taken advantage of through the Internet. Educating them on proper
Internet use will lessen the probability of their identity being
discovered or used in a negative way.

2. Cyberbullying (Becky Roudebush)

• Cyberbullying is the use of technology for social cruelty, which


can include harassment, impersonation, denigration, trickery,
exclusion and stalking. Cyberbullies may use email, chat rooms,
discussion forums, instant messaging, cell phone text messaging or
popular teen web sites such as MySpace.com.
• Cyberbullying Week # 3
• General Questions
o Who is the perpetrator in this case? Who is the target?
I believe the perpetrator in this case was both Colin and Scott. In
the beginning of the case study Scott was targeted by the
perpetrator Colin, then Colin was targeted by the perpetrator Scott
in the end.

o What acts of cyberbullying have happened in this case?


How serious would you rank each one as being?
Two acts of cyberbullying have occurred in this case study. The first
was Collin targeting Scott on his facebook account by telling his
friends via facebook to remove Scott of their friends list. The
second case of cyberbullying was when Scott formed a facebook
group called "I hate Colin". I think the facebook group named "I
hate Colin" could be ranked as a 3, wrong and school authorities
should be involved. The asking of friends to stop excepting someone
as a friend would be ranked as a 2, wrong but no actions need to be
taken.

Group Questions
o Scott: How can you defend your actions?

I was trying to get back at Colin for starting all this. He was the one
who asked people to take me off their friends list.

o Colin: Was what you did cyberbullying as well? If so, how


can you accuse Scott? If not, why not?

I don't think so. I just asked my friends to take Scott off their
friends list. They did not have to do it! Scott was the one who
really committed the cyberbullying by starting the facebook group.

o Colin’s parents: What should school and civil authorities


do about this case? Why?

I don't think civil authorities should be involved unless there was


some actual physical damage. However the school authorities should
take both boys off of the school's facebook account and remove the
"I hate Colin" group off the schools facebook account as well. Scott
should have a type of suspention and some kind of notation in his file
be added about this cyberbullying.

o Other members of Scott’s Facebook group: What can


you do, and should you have done, in this case? Why?

Now that it has got to this point I can see how the facebook group
was wrong. It really targeted Colin in an unfair way. Looking back I
should have not joined the group. This would have given less power
to Scott and probaly prevented the problem.

o Teacher: What can you do, and should you have done, in
this case? Why?
As a teacher I could have been monitoring the school's facebook to
see what my students are up to. I think I should be spending a little
time on the school's page to keep in check of the students
activities. This may help deter any more cyberbullying in the future
if the students know that I am monitoring their actions.
o Police: Should criminal charges be laid in this case? If
so, which ones and why? If not, prepare an explanation for the
target’s parents as to why not.
No criminal charges should not be laid in this case. Unless their was
physical damage committed against another person criminal charges
should not be laid in this case. However it does bring up the question of
what should be a parental punishment for the perpetrator.

• Discuss why cyberbullying is important to teach your


students

Educating the kids about the consequences (losing their ISP or IM


accounts) helps. Teaching them to respect others and to take a stand
against bullying also helps.

A good website to check for ways to prevent and what to do if your


student or child is a victim of cyberbullying is Net Bullies and
WiredSafety.

3. Cyber Predators (Sarah Hunt)

• A Cyber Predator "uses the Internet to hunt for victims to


take advantage of in ANYway, including sexually, emotionally,
psychologically or financially. Cyber predators know how to
manipulate kids, creating trust and friendship where none should
exist." (http://www.ctap4.org/cybersafety/cp.htm)
• Cyber Predators, Week 2
• Attached quiz & explanation is filled out.
o The following questions needed to be re-visited, because
I answered them incorrectly: 3.) "Internet predators looking
for sex with teens usually pretend to be teenagers
themselves;" 7.) "Posting private identity information online
puts teens at risk of unwanted invitations for sex." I read
through all of the explanations on pages 1 and 2.
o SAFETY TIP LIST:
 Be very careful about discussing sex with
strangers online.
 Do not give out personal information, including
address, telephone number, age, SS#, or your full name
to strangers.
 Posting revealing photos (inappropriate content)
of yourself or others online. It may attract unwanted
attention from strangers.
 Beware of online acquaintances who profess their
love for you. It is possible that they are more
interested in sex, not romance.
 Do not meet any online acquaintances in person
without an adult, such as a parent or teacher.
 Report aggressive or sexually suggestive behavior
to an adult. You can also contact the site's
owners/moderators.
 Report sexual invitations to the police. (Even if
you are responsible, you may be helping someone else
who may be putting themselves in danger.)
 It's okay to remove yourself from an
uncomfortable online situation.
• Informing students about cyber predators is critical in order
to teach them the responsible behaviors necessary to protect
themselves from becoming victims. It is important that students are
aware of all the dangers that are associated with online interactions
in order to avoid dangerous situations, as the online user (the
student) is ultimately the last line of defense against these
predators.

4. Piracy and Plagiarism (Carrie Lane):

• 1. Piracy, otherwise known as Intellectual Property,


means that an individual is granted ownership rights for
materials that he/she has created, written, designed, or
expressed. Some examples of materials include games,
movies, photos, writing, and music. An individual can be
punished by law for illegally downloading or sharing this
material without permission from the creator.
(http://jccsinternetsafety.wetpaint.com/page/Piracy+
%26+Plagiarism)
• 2. Piracy and Plagiarism, Week 3:

Into:

Students respond to the following scenario:

“You and a friend have been working on your final research papers for
one of your classes for the past month. The night before the papers
are due, you get together for an all-night editing session. At 1 a.m.,
your friend’s computer dies, and he loses his entire paper. He has no
back-up disk. Your friend is devastated, and he decides to download a
paper off of an Internet term paper site. How do you respond to his
actions?”

After giving students a few minutes to write, have some students share
their responses with the class.

I would respond to his actions by telling my friend that since he has


already written the paper, he has a good working knowledge of the topics
he wants to discuss. Therefore, if he will write an outline for the paper, I
will help him research the topics while he finds all the details. Together, we
can work to recreate the paper he has lost.

Then, develop a class definition of plagiarism.

Our class definition of plagiarism, paraphrased from


wordnetweb.princeton.edu, could be: taking the words or ideas of others
and claiming them as your own words or ideas
(wordnetweb.princeton.edu/perl/webwn)

1. How did Ms. Prestebak discover that the high school student had taken
his paper off the Internet?
Ms. Prestebak discovered that the high school student had taken his paper
off the Internet by typing the first few words into an Internet search
engine. Her results showed that the paper had been entirely copied from an
online website.

2. How has the temptation to cheat been increased by access to the


Internet?
The temptation to cheat has been increased by access to the Internet
because the Internet offers a variety of sites that offer full-length
essays, as well as research, literary, and term paper examples that a
student can view and inappropriately claim as his/her own. Also, e-mail
makes it easy for students to borrow and share work with one another.

3. What happened at the University of Virginia with regards to this topic?


At the University of Virginia, 122 students are currently under suspicion
for possibly plagiarizing term papers for an introductory physics class.

4. What did Donald McCabe’s survey reveal?


McCabe's survey reveals that plagiarism is a bigger problem with high
school students than college students. While more than 50% of high school
students admitted to copying at least some elements of their papers from
the Internet, only 10-20% of college students admitted to these practices.

5. According to Cathy Aubrecht, what is a sign that a student has


plagiarized?
Cathy Aubrecht suggests that a sign of student plagiarism is when a
student hasn't done any work on his/her research paper throughout the
semester but creates a wonderful, well-written paper in the end.

6. What are some of the consequences for plagiarism?


Consequences for plagiarism differ in high school and college. In high
school, some consequences are that the student may have a letter sent
home or be docked a letter grade. As a worst-case scenario, a student may
become in jeopardy of graduating. In college, plagiarism is taken more
seriously, and students can be suspended or expelled.

7. What are some resources that schools can use to find out if students
are plagiarizing materials?
Some resources schools can use to find out if students are plagiarizing
materials are websites that contain databases of papers that have been
written and present on popular "term-paper mills." One such site is
Turnitin.com. These services allow administration to search for keywords
within essays to find out if sentences or full essays have been copied from
an Internet site.

(http://www.nytimes.com/2001/06/28/technology/28CHEA.html?
pagewanted=2)

Beyond:

As a class, discuss the difference between quoting directly from a source,


paraphrasing the source, and using the source as background material for
your own ideas. In which cases would you have to cite the source?

The difference between quoting directly from a source, paraphrasing a


source, and using the source as background for your own ideas is that
quoting directly refers to using word-for-word copying of a document.
This type must be cited and contained in quotation marks. Paraphrasing
means creating a summation of a given paragraph or sentence and
rewording it. To be safe, this type of summation should include a
reference site as well unless it is common knowledge. Using the source
as background means taking ideas in the piece and expanding on them.
This type of reference should be sited in a works cited unless it refers
to common knowledge information.

3. Discussion:
This area is incredibly important to teach one's students. Plagiarism is
a serious crime and also shows a lack of respect for intellectual
property. A student who plagiarizes not only has illegally copied
copyrighted information, but he/she is losing out on learning new
material and developing a strong knowledge base of his/her own. I
believe that students must be aware of the definition of plagiarism, as
well as how easily materials can accidentally be plagiarized with the
omission of footnotes, endnotes, or a works cited page. Additionally,
by explaining plagiarism early on, students will learn acceptable
behavior patterns that will hopefully follow them throughout their lives
and professionally careers. All of these reasons explain the need to
teach students about examples of and the effects of plagiarism at an
early age.

5. Inappropriate Content (Ryan Martinez)

• "Inappropriate Content has been defined in the Children's


Internet Protection Act as visual depictions that are obscene, child
pornography, or material "harmful to minors" Categories include
pornography, hate groups, violence, illegal activity, extremist groups,
online advertising."
(http://jccsinternetsafety.wetpaint.com/page/Inappropriate+Conten
t)

• Inappropriate Content, Week 1

In a group setting discuss the following questions...


1.What are some of the ways that the Internet is a useful tool? (e.g.,
communication, education, entertainment, business)
2.Do you think that the Internet can be dangerous? Explain your thinking
or give an example.
3. How have you heard the word "racist" used? How would you define the
term "racist?"
4. Who knows what a chat room is? Explain.
5. Do you think that chat rooms can be a dangerous medium? Do any of you
have any specific experiences with chat rooms that you'd like to share? (an
example might address personal safety in chat rooms)
6. Do you think that chat rooms target a specific audience? Explain your
thinking or give an example. (an example of a target audience might be
children or young adults)
7. Have you ever been part of a chat room discussion in which either you or
someone else gave out false information? Why do you believe people use
chat rooms to create false identities?

Read Story about Daniel:


Daniel, a twelve-year-old boy, entered a chat room one day from home.
Another boy who was in the room greeted Daniel and they proceeded to
"chat." They discovered that they were both White Sox fans, so the boy
typed, "Perhaps we can meet one day and go to a baseball game. What's
your real name (not online name) and home phone number?" Daniel was
excited to go to a game and he entered his information. As they continued
writing, they discussed their families' origins. Daniel wrote that his
grandparents were Holocaust survivors from Europe who were liberated
after being in concentration camps for two years. The other boy didn't
respond and logged offline. Within five minutes, Daniel received numerous
e-mails saying: "Die Jew!" He received repeated phone calls repeating the
same message. His parents finally were forced to disconnect the phone.
When they asked what happened, Daniel told them the story. They asked
him who the other boy was, but Daniel didn't know his real identity. When
his parents asked to see the hate-filled e-mail messages, Daniel told them
he deleted them as soon as he got them because they were so disturbing.
Fortunately, Daniel did not give out his home address.
Student Questions:
1.Describe, in your own words, what happened to Daniel.
Daniel was the victim of a cyberbully, because he did not practice safe
communication with other users.
2. How was he feeling before the hate message? After the hate message?
He was excited about possibly making a new friend and going to a baseball
game. After the message, he was scared and disturbed.
3.What could he have done to avoid this experience?
Daniel could have avoided this situation by not giving out any personal
information.
4. What would you have done if you had been in the chat room when these
hateful messages popped up?
I would have kicked some cyber ass! and I would've flagged the user as
inappropriate to the moderator so they wouldn't be to hurt others. I also
would avoid that user in the future.
5. What are some of possible ways that people can protect themselves
from this kind of hate on the Internet?
They can avoid this by not giving personal information. Also, by staying in
chat rooms that are well known as safe through moderators.
6. Do you think it is ever safe to reveal personal information over the
Internet? If yes, when? If no, why not?
No. It is not safe in public forums. But it can be safe on secured websites.
Typically, those are not situations where you can be contacted by people
you don't know.
7.What other kinds of hate that could exist on the Internet?
Internet websites that are directed to hurt by portraying hateful
information.
8. Have you ever experienced such kinds of hate?
No.
9. What could you do if you encountered hate on the Internet?
Kick some cyber ass! Also, I would get in contact with the moderators or
controllers of the site to help the situation and make it safer.

6. Social Networks (Ryan Martinez)


• A Social Network is defined in the Computing Dictionary as,
"a website designed to allow multiple users to publish content
themselves. The information may be on any subject and may be for
consumption by (potential) friends, mates, employers, employees, etc.
The sites typically allow users to create a "profile" describing
themselves and to exchange public or private messages and list other
users or groups they are connected to in some way. There may be
editorial content or the site may be entirely user-driven. Content
may include text, images (e.g.(http://flickr.com/)), video
(e.g. (http://youtube.com/)) or any other media. Social networks on
the the web are a natural extension of mailing lists and bulletin
boards. They are related to wikis like (http://wikipedia.org/) but
typically do not allow users to modify content once it has been
submitted, though usually you can publish comments on others'
submissions. Different sites have different
emphasis." (http://www.dictionary.reference.com/browse/social
network)
• Social Networks, Week 1
• INTO: Watch Video on posting images:
o Write a half-page response to the video:
After watching the Public Service announcement, it's
clear that social networks present an issue that is
difficult to overcome. Drawing the parallel between
reality and cyber-reality is a powerful device to show the
control that we have. Having an embarrassing picture
posted on the wall of a school is comparable to having one
posted on a social networking site like Facebook. It's an
image that can be seen by so many. It creates an image of
you as a person. It is a reflection that can be hard to
break in society once it has been shown. Just like in a high
school setting, it is important to be able to stay clear of
making those decisions that could cause a negative image
of you to be posted, whether it be a tangible wall or one
online.
o Starter Questions from video: Who is the target of this
video? Is the message effective? Does it connect to you in
real ways? Do you know someone who has experienced this or
something similar?
• THROUGH: Scenarios and Questions:
o You are the young manager of an ice cream parlor that is
beloved by local families. You are looking to hire some teens
for the summer, when the shop is open late every evening. You
require an application and at least one reference. It occurs to
you that you could look online to find out a bit more about the
applicants.
Where would you look? And what might you find that would
make you not hire someone? You could look on Facebook or
Myspace to see if they have a profile and if its public you
could see what kind of character the person has by the
material on the site. There could be pictures that are not
appropriate behaviors for teenagers or there could be
interests on there in text form that might be offensive as
well. A manager could use this information to help them decide
on a possible employee.

o You have a social network profile and are smart enough


to use the privacy settings to keep your stuff away from the
eyes of people other than your friends. A friend of yours
thinks a silly photo of you in your underwear is funny, copies
the photo, and places it on her public profile. How might you
feel? What might be the unintended results of such a photo in
a public place? As a male, I am not as private with my body so
having that type of picture shown online in a public forum
might not offend me too much. I would be concerned if
possible employers or parents could see that information. I
would not want to present a negative image to those people.
For that reason, I would possibly ask the friend to take it
down. I would not be angry though. I would probably ask for
the picture so I could post it on my private
site!

o You are a college freshman. Your cousin, who is a high


school freshman, asks to “friend” you on a social networking
site. You like your cousin and don’t want to hurt his feelings,
but you say “no.”
What are some reasons you might not want your cousin to see
your profile and friends? You want to be a positive influence
on your cousin and feel like as a college freshman there might
be information on your site that you wouldn't want them to
see so you can continue to be that influence.
o You join a social networking site and set up your own
profile. You spend a lot of time making the profile look cool
and you have links to many friends. Your mom makes her own
profile and asks you to be her “friend.”
Is that fair? Explain your thinking. For a child, no it wouldn't
be fair in their mind, because they would want to have the site
as a way to create their own life outside of their family.
Having their mom there would create a connection back, which
isn't what the child wants. However, it is in the best interest
of the child to have their parent as a friend. As an adult, I
encourage my parents to befriend me. It makes it easier, so I
don't have to call them as much to keep them up on my life.

You might also like