SlideShare une entreprise Scribd logo
1  sur  12
“But mum and dad say its ok!”
K-6 student’s safety online.
A staff development session covering key
safety issues for K – 6 teachers.
James J Jarick
Teacher – Caringbah North PS
(1) (2)
A Digital Literacy Continuum
How can mums, dads and TEACHERS know what is safe?
They need help – Cybersafety
(3) (4) (5) (6)
(7) (8) (9)
This Presentation
(Key aspects of Cybersafety)
• So what is Cybersafety?
• Coming to grips with the jargon.
• Protecting your Digital Identity.
• Who’s your friend?
• Never an excuse for bad manners!
• It’s up to us!
• Other Issues
(10)
So what is Cybersafety
Definition:
Cybersafety is the safe and responsible
use of Information and Communication
Technologies (ICT).
(www.cybersafety.org.nz)
Safe use = no harm (physical, emotional or psychological) to themselves.
Responsible use = no harm to others.
(11)
Coming to grips with the jargon
(Terminology)
Online Profile / Digital Profile / Digital Identity:
The you that you generate online.
Digital Footprint:
The trail you leave about yourself when you’re on the
net.
Grooming:
When an adult takes deliberate actions to befriend and
establish an emotional connection with a child in order
to lower the child's inhibitions with the intent of later
having sexual contact. (Cybersmart – Glossary)
(12)
Protecting your Digital Identity
(Securityand Privacy)
• Set strong passwords. No “common passwords”,
even Kindy need to learn to protect themselves.
• Use effective and up to date virus / malware
protection. Once someone is in your computer /
device they can become you!
• Who do you want to share information with?
Check providers privacy policies and check privacy
settings in programs.
(Microsoft)
(13)
WEB 2.0 - Who’s your friend?
(Stranger Danger)
Fredrick Bloggs
bloggo@friendlymail.com
bloggo@friendlymail.com
**************
Month 10th Day18th
Year 2004
Other issues:
• Students can share to much personal information
• Students don’t protect their information
“Overview of Key Cybersafety Features”
http://www.dbcde.gov.au/easyguide
(unauthorised?)
(14)
There is never an excuse for
bad manners! (Online Etiquette)
• Cyberbullying is deliberately and repeatedly engage in hostile
behaviour to harm someone.
• All online activity, from any device on the department network can be
traced.
• Dangers
• Once something is posted on the net it can be difficult to remove all
copies of it (circulation).
• A huge, potentially global, audience.
"Netiquette" is network etiquette, the do's and don'ts of online communication.
(Ross, 2012)
(15)
It’s up to us!
(Policy and Strategies)
• Departmental policies
• School policies
• Changing behaviours
• Cybersafety Team
• Technology Audit – what are our students using
• Scope and sequence for Cybersafety training
• Resource units of work
• Train up staff in delivery
• Deliver
• Assess and review
(16)
Other Cybersafety issues that
may arise:
• Digital reputation
• Downloading
• Excessive internet use
• Identity theft
• Inappropriate content
• Online shopping
• Sexting
• Unwanted contact
• Violent / explicit content
Summary
As teachers we not only provide access for students to the world
via the internet we encourage students to utilise its power in
many different ways. With this instruction comes a responsibility
to ensure student safety in this “new?” and very open
environment.
Summary
Defined
Online Profiles
Other issues
Conclusion
Questions
1. Is there a natural hierarchy of risk that would form the basis for a
scope and sequence of cybersafety for K-6 students?
2. Are there cybersafety issues that should not be covered in K – 6?
3. How many people should be in the Cybersafety Team, open for all,
one from each grade (7) or one from each stage (4)?
This presentation
Bibliographyand Recommendedreading(Bold)
Cybersmart. (n.d.).
http://www.cybersmart.gov.au
Cybersmart. Glossary. (n.d). Retrieved from
http://www.cybersmart.gov.au/Parents/About%20the%20technology/Glossary.aspx
DBCDE. Overview of Key Cybersafety Features. (n.d.). Retrieved from
http://www.dbcde.gov.au/easyguide
Microsoft. Create strong passwords. (2012). Retrieved from
http://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspx
Netsafe. What is Cybersafety? (n.d.). Retrieved from
www.cybersafety.org.nz/kit/welcome/cybersafety.html
Online Communication Services: Acceptable Usage for School Students. (n.d.). Retrieved from
https://www.det.nsw.edu.au/policies/general_man/general/accep_use/
Ross,S.T. (2012) Netiquette. Retrieved from
http://www.albion.com/netiquette/
All Images obtained from Google Images under Collective Commons

Contenu connexe

Tendances

Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network pptKristi DeRoche
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social MediaMark Ness
 
Student Environment Powerpoint[2]
Student Environment Powerpoint[2]Student Environment Powerpoint[2]
Student Environment Powerpoint[2]Maryam_A_T
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and CyberbullyingLouise Jones
 
"If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!""If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!"Kaido Kikkas
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Successemilyensign
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementaryemilyensign
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention emilyensign
 
Mentoring Youth in the Digital Age
Mentoring Youth in the Digital AgeMentoring Youth in the Digital Age
Mentoring Youth in the Digital AgeTeamMates
 
Mentoring Youth in the Digital Age
Mentoring Youth in the Digital AgeMentoring Youth in the Digital Age
Mentoring Youth in the Digital AgeTeamMates
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015emilyensign
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile worldBrian Katz
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.CAS
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technologygibbs753
 

Tendances (20)

Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Inappropriate use of the network ppt
Inappropriate use of the network pptInappropriate use of the network ppt
Inappropriate use of the network ppt
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
ICT winter 2011
ICT winter 2011ICT winter 2011
ICT winter 2011
 
Social Media
Social MediaSocial Media
Social Media
 
Navigating Social Media
Navigating Social MediaNavigating Social Media
Navigating Social Media
 
Student Environment Powerpoint[2]
Student Environment Powerpoint[2]Student Environment Powerpoint[2]
Student Environment Powerpoint[2]
 
Social Networking and Cyberbullying
Social Networking and CyberbullyingSocial Networking and Cyberbullying
Social Networking and Cyberbullying
 
"If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!""If I Don't Like Your Online Profile, I Will Not Hire You!"
"If I Don't Like Your Online Profile, I Will Not Hire You!"
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
The 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship SuccessThe 6 Pillars of Digital Citizenship Success
The 6 Pillars of Digital Citizenship Success
 
BEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette ElementaryBEaPRO Presentation: Lafayette Elementary
BEaPRO Presentation: Lafayette Elementary
 
Iowa Bullying Prevention
Iowa Bullying Prevention Iowa Bullying Prevention
Iowa Bullying Prevention
 
Mentoring Youth in the Digital Age
Mentoring Youth in the Digital AgeMentoring Youth in the Digital Age
Mentoring Youth in the Digital Age
 
Mentoring Youth in the Digital Age
Mentoring Youth in the Digital AgeMentoring Youth in the Digital Age
Mentoring Youth in the Digital Age
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
The need for effective information security awareness practices.
The need for effective information security awareness practices.The need for effective information security awareness practices.
The need for effective information security awareness practices.
 
Teaching with technology
Teaching with technologyTeaching with technology
Teaching with technology
 

En vedette

03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdfNhaQue43
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdfNhaQue43
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdfNhaQue43
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdfNhaQue43
 
05 tapkhucpdf
05 tapkhucpdf05 tapkhucpdf
05 tapkhucpdfNhaQue43
 
ProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentationProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentationSania Mansouri
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdfNhaQue43
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdfNhaQue43
 
ProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentationProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentationSania Mansouri
 
Discover my Hilton Fort Lauderdale Marina - Earn 5% Back to your Master
Discover my Hilton Fort Lauderdale Marina - Earn 5% Back to your MasterDiscover my Hilton Fort Lauderdale Marina - Earn 5% Back to your Master
Discover my Hilton Fort Lauderdale Marina - Earn 5% Back to your MasterEduardo A. Zuniga, HMCC
 

En vedette (11)

03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdf
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdf
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdf
 
02 thopdf
02 thopdf02 thopdf
02 thopdf
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdf
 
05 tapkhucpdf
05 tapkhucpdf05 tapkhucpdf
05 tapkhucpdf
 
ProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentationProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentation
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdf
 
03 duongxuapdf
03 duongxuapdf03 duongxuapdf
03 duongxuapdf
 
ProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentationProteoCell Biotechnologies_bd_presentation
ProteoCell Biotechnologies_bd_presentation
 
Discover my Hilton Fort Lauderdale Marina - Earn 5% Back to your Master
Discover my Hilton Fort Lauderdale Marina - Earn 5% Back to your MasterDiscover my Hilton Fort Lauderdale Marina - Earn 5% Back to your Master
Discover my Hilton Fort Lauderdale Marina - Earn 5% Back to your Master
 

Similaire à Etl523 pres jj jarick

Cybersafety
Cybersafety Cybersafety
Cybersafety Sue Noor
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...mulingoh
 
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technologyJohan Koren
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technologyJohan Koren
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship ppKatie Ward
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxamandaschilling75
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the webjhollatz
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015bellla33
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Nat Rice
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
Developing an effective e-safety policy
Developing an effective e-safety policyDeveloping an effective e-safety policy
Developing an effective e-safety policyMatt Britland
 

Similaire à Etl523 pres jj jarick (20)

Cybersafety
Cybersafety Cybersafety
Cybersafety
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCourse Tech 2013, Mark Ciampa, Helping Students Stay Secure
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
Naughty or nice: Ethical concerns with technology
Naughty or nice:  Ethical concerns with technologyNaughty or nice:  Ethical concerns with technology
Naughty or nice: Ethical concerns with technology
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdfSafeguarding K-12 Organizations from Cybersecurity Threats  WPGC.pdf
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdf
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
 
E safety training
E safety trainingE safety training
E safety training
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
 
Watcha Webtrap!
Watcha Webtrap!Watcha Webtrap!
Watcha Webtrap!
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
Developing an effective e-safety policy
Developing an effective e-safety policyDeveloping an effective e-safety policy
Developing an effective e-safety policy
 

Dernier

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Dernier (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Etl523 pres jj jarick

  • 1. “But mum and dad say its ok!” K-6 student’s safety online. A staff development session covering key safety issues for K – 6 teachers. James J Jarick Teacher – Caringbah North PS (1) (2)
  • 2. A Digital Literacy Continuum How can mums, dads and TEACHERS know what is safe? They need help – Cybersafety (3) (4) (5) (6) (7) (8) (9)
  • 3. This Presentation (Key aspects of Cybersafety) • So what is Cybersafety? • Coming to grips with the jargon. • Protecting your Digital Identity. • Who’s your friend? • Never an excuse for bad manners! • It’s up to us! • Other Issues (10)
  • 4. So what is Cybersafety Definition: Cybersafety is the safe and responsible use of Information and Communication Technologies (ICT). (www.cybersafety.org.nz) Safe use = no harm (physical, emotional or psychological) to themselves. Responsible use = no harm to others. (11)
  • 5. Coming to grips with the jargon (Terminology) Online Profile / Digital Profile / Digital Identity: The you that you generate online. Digital Footprint: The trail you leave about yourself when you’re on the net. Grooming: When an adult takes deliberate actions to befriend and establish an emotional connection with a child in order to lower the child's inhibitions with the intent of later having sexual contact. (Cybersmart – Glossary) (12)
  • 6. Protecting your Digital Identity (Securityand Privacy) • Set strong passwords. No “common passwords”, even Kindy need to learn to protect themselves. • Use effective and up to date virus / malware protection. Once someone is in your computer / device they can become you! • Who do you want to share information with? Check providers privacy policies and check privacy settings in programs. (Microsoft) (13)
  • 7. WEB 2.0 - Who’s your friend? (Stranger Danger) Fredrick Bloggs bloggo@friendlymail.com bloggo@friendlymail.com ************** Month 10th Day18th Year 2004 Other issues: • Students can share to much personal information • Students don’t protect their information “Overview of Key Cybersafety Features” http://www.dbcde.gov.au/easyguide (unauthorised?) (14)
  • 8. There is never an excuse for bad manners! (Online Etiquette) • Cyberbullying is deliberately and repeatedly engage in hostile behaviour to harm someone. • All online activity, from any device on the department network can be traced. • Dangers • Once something is posted on the net it can be difficult to remove all copies of it (circulation). • A huge, potentially global, audience. "Netiquette" is network etiquette, the do's and don'ts of online communication. (Ross, 2012) (15)
  • 9. It’s up to us! (Policy and Strategies) • Departmental policies • School policies • Changing behaviours • Cybersafety Team • Technology Audit – what are our students using • Scope and sequence for Cybersafety training • Resource units of work • Train up staff in delivery • Deliver • Assess and review (16)
  • 10. Other Cybersafety issues that may arise: • Digital reputation • Downloading • Excessive internet use • Identity theft • Inappropriate content • Online shopping • Sexting • Unwanted contact • Violent / explicit content
  • 11. Summary As teachers we not only provide access for students to the world via the internet we encourage students to utilise its power in many different ways. With this instruction comes a responsibility to ensure student safety in this “new?” and very open environment. Summary Defined Online Profiles Other issues Conclusion
  • 12. Questions 1. Is there a natural hierarchy of risk that would form the basis for a scope and sequence of cybersafety for K-6 students? 2. Are there cybersafety issues that should not be covered in K – 6? 3. How many people should be in the Cybersafety Team, open for all, one from each grade (7) or one from each stage (4)? This presentation Bibliographyand Recommendedreading(Bold) Cybersmart. (n.d.). http://www.cybersmart.gov.au Cybersmart. Glossary. (n.d). Retrieved from http://www.cybersmart.gov.au/Parents/About%20the%20technology/Glossary.aspx DBCDE. Overview of Key Cybersafety Features. (n.d.). Retrieved from http://www.dbcde.gov.au/easyguide Microsoft. Create strong passwords. (2012). Retrieved from http://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspx Netsafe. What is Cybersafety? (n.d.). Retrieved from www.cybersafety.org.nz/kit/welcome/cybersafety.html Online Communication Services: Acceptable Usage for School Students. (n.d.). Retrieved from https://www.det.nsw.edu.au/policies/general_man/general/accep_use/ Ross,S.T. (2012) Netiquette. Retrieved from http://www.albion.com/netiquette/ All Images obtained from Google Images under Collective Commons

Notes de l'éditeur

  1. Welcome to my presentation my name is James Jarick and I am currently a teacher at Caringbah North PS where I have a 4/5 composite class (CLICK). Caringbah North is a school in Sydney’s Sutherland Shire about 10 minutes from the beaches of Cronulla. There are 21 classes , two of which are OC classes and we have around 520 students. I share the role of Computer Coordinator with one of our OC teachers and prior to term 2 last year I had been the TL and Computer Coordinator at Clemton Park PS since 2003.As you can see my presentation today is aimed at K-6 teachers and its focus is on online safety. It is based on the premise that many teachers at my school are unfamiliar with these safety issues. But how can that be the case you ask.
  2. A Digital Literacy Continuum?Ilike to put forward the concept that we all sit on a Digital Literacy Continuum that stretches from the Geekiest Computer Geek (eg Bill Gates) through to the least techno savvy of us e.g. my mum who still has 4 8s flashing on her microwave oven. Whilst we all sit at a different point on this continuum we have a duty of care to our students, one that many parents can not fulfil, in ensuring the safety of our students when they are utilising ICT.Let us firstly reflect on how this safety issue has arisen and take a minute to think about where we each sit on this continuum. For me this is how my technology journey started:(CLICK) Growing up in the late 60’s where if I wanted to contact someone I had to walk around the corner to a Red phone box. (CLICK) In the early 70’s we got a home phone like this BUT it had a lock and dad took the key to work (Analogue safety?)(CLICK) 1985 Work bought a Brick phone for safety issues because we were working off site. At $3,500 there still weren’t many about.(CLICK) In 1996 we purchased our first mobile phone. It cost $1200 plus plan for the simple reason that my wife was having our first son.(CLICK) In our household now we have a range of users, from my wife and myself who would best be described as purpose users. Josh (18) and uses tech to keep in touch with friend (and arrange parties) and Jayson (14) who has grown up with facebook, online gaming and instant access – for him it’s all just part life and doesn’t change fast enough.(CLICK)and who knows where this is all leading us to?Kids now can reach out across the world at the touch of a button and interact with anyone anywhere at any time– BUT WHO IS GUIDING AND PROTECTING THEM whilst they do this? (CLICK)As teachers our role has evolved along with this advancement in technology and a critical part of this new role is to ensure the safety of our students as they engage online.
  3. This presentation covers 6 main areas of Cybersafety in what I believe is the order of importance for Kindergarten students through to Year 6. These areas are:(CLICK) Defining what we mean by the term Cybersafety(CLICK) Major Terminology that is used when talking about Cybersafety(CLICK) Security and Privacy whilst students are online(CLICK) Online Etiquette and how they behave(CLICK) Stranger Danger in an online setting(CLICK) Policies and Strategies that we need to be aware of and develop (CLICK) I have also included an “Other Issues” section where I highlight some of the many safety issues that students may face as they move into a High School setting or at home with older siblings.
  4. So what is cybersafety? (CLICK) There are many definition of the term cybersafety, so why do I like this one from cybersafety NZ? Mainly because it is clear and simple, its two facets are to: (CLICK) act safely on the net to protect ourselves (CLICK) act responsibly on the net to protect othersSo, in summary cybersafety is not just about protecting our students from others, it is also about ensuring our students do not effect the safety of others.
  5. There is a plethora of terminology in and about the internet and cybersafety. Three of the more important from theCybersmart Glossary include:Online Profile / Digital Profile / Digital Identity:(CLICK) is the you that you generate online. As we will see later on in the presentation this “you” on line can be factual, fictional, or a mixture of both.Digital Footprint: (CLICK) the trail you leave about yourself when you’re on the net. This footprint is important because it can be traced in a number of ways and build your profile. The most obvious is searching for yourself on the internet. This progresses all the way through to tracing what sites your computer visits via your IP address.Most concerning for us as teachers is the concept of Grooming.Grooming: (CLICK) occurs when an adult takes deliberate actions to befriend and establish an emotional connection with a child in order to lower the child's inhibitions with the intent of later having sexual contact. = onlinepredators
  6. Microsoft suggest three key strategies to help protect your digital identity:The most common protection protocol takes the form of a username and password set. (CLICK) Set strong passwords. No “common passwords” even Kindy need to learn to protect themselves.These are our first line of defence and we must get students to recognise their importance and set and protect them appropriately.(CLICK) Use effective and up to date virus / malware protection. Once someone is in your computer / device they can become you!Virus protection is loaded and updated automatically on departmental devices and student information is protected by various firewalls. Student devices (BYOD) and home devices will be susceptible without up to date protection.(CLICK) Who do you want to share information with? Check providers privacy policies and check settings in programs.Protecting our privacy online is the same as protecting it offline. We wouldn’t hand out personal details to people we don’t know on the street so why would we want to do it to a bigger group online? Check privacy policies before we join web sites to see if they allow your information to be shared with third parties either partially or in full. Check wether web sites allow you to adjust privacy setting to restrict who has access to information that you decide to share online.Microsoft great advice for setting strong passwords on their website.Passwords: http://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspx
  7. When online one of the biggest areas of concern is that of Social Networking. Sites such as Facebook, Club Penguin and Twitter allow students to contact people they “think” they know. So, very quickly, how easy is it to set up an account?NameEmailPasswordMonth and dayYear = so I’m 8 yrs oldPhoto = obtained illegally for demonstration purposes was cropped straight from a school web pageAnd I’m done, I now have a profile as an 8 year old school boy. But who am I really? (Click 7)Age guidelines do apply to major social networking sites BUT of course they are easily falsified.Here we are talking about our major concern, Grooming and inappropriate contact and we need to make sure our students are aware that if they don’t “know” the person they could be anyone.Other issues with these web 2 sites include:(CLICK) Sharing too much personal information - photos, addresses, schools – any information that can make students locatable.(CLICK) Not protecting personal information - not just what we are sharing but who we are sharing it with. We need to set privacy settings so that they don’t end up with friends of friends of friends etc…(CLICK) For an overview of some of the key safety features on many of the more popular social networking and gaming sites visit the Department of Broadband, Communications and the Digital Economy website at http://www.dbcde.gov.au/easyguide
  8. (CLICK) Online etiquette or Netiquette covers all aspects of online communication and as with normal etiquette there are a variety of interpretations and expectations about behaviour.(CLICK) One aspect of Netiquette that is universally agreed upon is the unacceptability of Cyberbullying, a deliberate and repeated attack on an individual.Students need to realise that the internet is not an anonymous environment and students can, and are, tracked and are held accountable for their online behaviour. If they are the target of this behaviour, as with any bullying behaviour, the earlier they speak out the quicker and easier it is to address the problem. Most or good web sites will have the facility to allow you to report inappropriate behaviour. http://www.albion.com/netiquette/http://www.cybersmart.gov.au/Parents/Cyber%20issues/Cyberbullying.aspx
  9. DepartmentReview and familiarise ourselves with the departments policyOnline Communication Services: Acceptable Usage for School Studentshttps://www.det.nsw.edu.au/policies/general_man/general/accep_use/PD20020046.shtml?level=Which all department personnel, including students, agree to as a summary each time they log in.School policies need to be developed and these should aim at contextualise the departmental policies for application at a school level and cover areas such as:CybersafetyUse of Mobile devicesBYODThese policies need to be focused on changing behaviours and developing appropriate behaviours in students not just punitive.To do this we need to develop a Cybersafety Team with the initial tasks of :Design and construct a Technology Audit to measure what technology our students are using as well as how they are using it.Develop a Scope and Sequence for Cybersafety training based on what and how our students are currently using technology.Resource units of workTrain up staff in delivery of this workDeliver the trainingAssess and review
  10. Other Cybersafety issues may arise as students enter HS or that they may be exposed to through older siblings include things such as:Managing their Digital reputation as they build their online presentsDownloading, piracy and copyright Excessive internet use Identity theft Inappropriate content Online shoppingSexting Managing unwanted contact Violent / explicit content Many of these issues we would hope not to encounter at a K – 6 level and some are mitigated at school by the departments filters but I am also sure that as the web continues to work itself further into all our lives that other issues will arise and we will need to be in a position to respond quickly to the challenge of helping protect our students.
  11. So in summary we have:Defining what we mean by the term CybersafetyMajor Terminology that is used when talking about CybersafetySecurity and Privacy whilst students are onlineProfiles and how easily they are to falsifyOnline Etiquette or Netequette and how they behaveStranger Danger in an online settingPolicies that we need to be aware of and Strategic process we can follow to achieve a positive outcome for our students.In conclusionAs teachers we not only provide access for students to the world via the internet we encourage students to utilise its power in many diferent ways. With this instruction comes a responsibility to ensure their safety in this new and very open environment.
  12. QuestionsIs there a natural hierarchy of risk that would form the basis for a scope and sequence of cybersafety for K-6 students?Are there cybersafety issues that should not be covered in K – 6?How many people should be in the Cybersafety Team, one from each grade (7) or one from each stage (4)?Bibliography and recommendedreadings:Cybersmart. (n.d.).http://www.cybersmart.gov.auCybersmart. Glossary. (n.d). Retrieved from http://www.cybersmart.gov.au/Parents/About%20the%20technology/Glossary.aspxDBCDE. Overview of Key Cybersafety Features. (n.d.). Retrieved fromhttp://www.dbcde.gov.au/easyguide Microsoft. Create strong passwords. (2012). Retrieved fromhttp://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspxNetsafe. What is Cybersafety? (n.d.). Retrieved fromwww.cybersafety.org.nz/kit/welcome/cybersafety.htmlOnline Communication Services: Acceptable Usage for School Students. (n.d.). Retrieved fromhttps://www.det.nsw.edu.au/policies/general_man/general/accep_use/Ross,S.T. (2012)Netiquette. Retrieved fromhttp://www.albion.com/netiquette/All images sourced under CC-BY-SA or approved for use by Caringbah North PS.Caringbah North Public School - James Joseph JarickCaringbah North Public School – 4/5Jhttp://commons.wikimedia.org/wiki/Category:Haroldswickwww.fotopedia.com/items/flickr-425100484http://thomasdavisgrouprealty.com/2011/07/things-to-do-with-your-old-cell-phone/http://foter.com/Oldschool%20phone/http://www.flickr.com/photos/25031050@N06/4442939883/http://www.speedofcreativity.org/feed/atom/Microsoft ClipartMicrosoft Cliparthttp://library.thinkquest.org/06aug/01158/home.htmlhttp://www.kippypdesigns.com/2012/11/blah-blah-blah.htmlhttp://newdelhi.olx.in/cyber-security-assesment-risk-analysis-services-iid-447575682http://www.flickr.com/photos/chexed/1546923312/https://en.wikipedia.org/wiki/File:HisgirlFriday.jpgCaringbah North PS