Digital Citizen Project:   Bullying using social media, texting, or electronic means Digital security, including issues of cybersecurity

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

A computer circuit board. Digital Citizen Project: Bullying using social media, texting, or electronic means Digital security, including issues of cybersecurity.

Scene 2 (35s)

Audio Recording Oct 1, 2022 at 10:31:43 AM. Cyberbullying What is it?.

Scene 3 (45s)

Audio Recording Oct 1, 2022 at 10:37:26 AM. Issues in Cyberbullying.

Scene 4 (1m 14s)

Audio Recording Oct 1, 2022 at 10:55:46 AM. How do we handle this new modern form of bullying?.

Scene 5 (1m 25s)

Audio Recording Oct 1, 2022 at 10:57:35 AM. How would you bring up the subject of Cyberbullying to your students or kids? ​ As a teacher, what do you feel are the best repercussions for those found guilty or those who confessed to cyberbullying? Do you think the punishment should be the same for traditional bullying and cyberbullying? ​ With the use of technology in classrooms and homes a constant, how do you as a teacher try to avoid cyberbullying?.

Scene 6 (1m 56s)

Audio Recording Oct 1, 2022 at 10:58:10 AM. Digital Security.

Scene 7 (2m 5s)

Audio Recording Oct 1, 2022 at 11:04:20 AM. Icon Description automatically generated.

Scene 8 (2m 41s)

Audio Recording Oct 1, 2022 at 11:05:59 AM. According to the FBI’s Internet Crime Complaint Center (IC3) a reported 2.7 Billion Dollars was stolen in cybercrimes just last year..

Scene 9 (3m 4s)

Digital Literacy as a Citizenship Right. Challenges.

Scene 10 (4m 13s)

Challenge 1: Immaturity and Naiveté. Nearly one-half of teens interfere with their own learning by multitasking with social media while doing their homework. Researchers at Stanford found that 82 percent of middle schoolers can’t distinguish between an ad labeled “sponsored content” and a real news story on a website. Schools can play a critical role by educating, empowering and engaging children with the best practices around technology use..

Scene 11 (5m 37s)

Opportunity 1: Understanding Expanded. A vast array of knowledge and resources available online, coupled with the ability to connect instantaneously with peers and educators, make for highly engaging and collaborative learning environments. Students can pursue their interests and find educational resources and experiences online any time, any place and at any pace..

Scene 12 (6m 18s)

Students often believe they have no control over who is able to contact them through social media and what is posted on their personal pages. Many children will remain silent because they are embarrassed and afraid their parents will overreact. The idea that their parents will engage with the other child, speak to other parents, or take away their devices is terrifying to them, so they do not say anything to an adult when cyberbullying happens. Also, children may not know that they have the power to block a person who is contacting them through technology. They do not have to passively accept the bullying. Whether it is on their phones or through social media they can choose to block the person so that they no longer need to deal with the bullying messages when they are safe at home. Parents and other trusted adults need to speak about cyberbullying openly and calmly with children. Adults should know that the best way to combat cyberbullying is to remain calm and understanding and communicate with children often. Adults need to make sure children know that they have control over who can contact them, that they are not alone, and that they should always let an adult know when cyberbullying occurs..

Scene 13 (7m 35s)

Bullying using social media, texting, or other electronic means.

Scene 14 (8m 51s)

There are different ways to cyberbully, but some of the most common are: Posting comments or rumors about someone that are mean, hurtful, or embarrassing. Threatening to hurt someone or telling them to kill themselves. Posting a mean or hurtful picture or video Pretending to be someone else online in-order to solicit or post personal or false information about someone else. Posting mean or hateful names, comments, or content about any race, religion, ethnicity, or other personal characteristics online. Creating a mean or hurtful webpage about someone. Doxing, an abbreviated form of the word documents, is a form of online harassment used to exact revenge and to threaten and destroy the privacy of individuals by making their personal information public, including addresses, social security, credit card and phone numbers, links to social media accounts, and other private data. There are other ways out there that cyberbullying can be done, but these are some of the most common forms that parents and students should be aware of..

Scene 15 (10m 5s)

Challenge 2: Digital Actions cause Physical Harm.

Scene 16 (11m 3s)

Opportunity 2: Make better citizens. Children’s social relationships seem to be enhanced by digital technology, especially since most of their social circle is now online. Educators are crucial to helping young people assess reliable news and information sources and navigate the pressures social media. Children at the forefront of national and global digital policies, not only to protect them from online harm but also to allow technology to help them fulfil their full potential..

Scene 17 (11m 36s)

A challenge for users can be learning how to recognize legitimate information from phishing. Scammers can use email, text, or even social media in phishing attacks. These attacks are used to gather the users personal information, phishing attacks on social media is used not only to steal personal information but to gain access to the users social media account. The problem with these attacks are they are made to look like legitimate sites and information so many users have a hard time recognizing them. Phishing emails and texts may look like they are from a company you know or trust. Scammers often update their tactics, but there are some signs that will help you recognize a phishing attacks..

Scene 18 (12m 25s)

Phishing emails and texts often tell a story to trick you into clicking on a link or opening an attachment. Things to look out for are: It says they have noticed some suspicious activity or log-in attempts Message claims there is a problem with your account or your payment information It says you need to confirm personal information It may include a fake invoice Message wants you to click on a link to make a payment.

Scene 19 (12m 59s)

To avoid phishing attempts on social media sites some tips include: Do not accept friend requests from strangers. Do not click on links to update your personal details – instead, visit the platform’s support pages to see what updating is needed, and how and when to do it. Do not use the same password and user-name for all your accounts because once one of them is stolen, all your accounts will be in jeopardy. Do not ignore prompts to update your operating system; many attacks exploit unpatched vulnerabilities..

Scene 20 (13m 39s)

Digital security, including issues of cybersecurity (e.g. Tiktok ).

Scene 21 (14m 11s)

Some points to keep in mind when using social media sites are: Users of social media should make sure they are familiar with the social media site’s terms so that you are aware of what information you are agreeing to share when you sign up. Be knowledgeable of what personal data the social media site is storing and sharing. Do not use your Facebook credentials to sign into other sites. While this may seem convenient, you are then giving permission to that site to view your personal page. Do not share private information on social media such as your full name and address. Consider carefully what private information you provide in your profile. Always be careful about what photos you are posting on your social media account. It may be best not to share photos at all because once they are posted it is done, but if you want to share photos then be sure there is not any personal information in the photo that can be used against you..

Scene 22 (15m 12s)

Social media users should always be familiar with privacy settings on social media platforms and adjust the settings to where you feel most comfortable. Consider others privacy, because while you may not be targeted personally, others may be targeted through you so do not display names of those in your network. Always consider what you post before posting it because you may regret it later. Once information is out there, it can spread. S o, before posting something make sure you would not mind your boss, teachers, friends, family or others seeing it. If it is something that may haunt you later, step back and reconsider. Last, make sure you have a strong, secure password you do not share, and always log out when you leave your social media site..

Scene 23 (16m 17s)

Digital Rights and Responsibilities of Students..

Scene 24 (16m 50s)

Challenge 1: Rights are hard to define. Policy-makers find it challenging to define the sliding scale of rights and responsibilities in the digital environment for students at a different age. Your students have the right to be themselves on the Internet, but they also have a responsibility to respect other people’s rights. Since digitalization is taking over modern education, your students clearly have the right to use the Internet. You, on the other hand, have a responsibility to teach them how to do it properly..

Scene 25 (17m 32s)

Opportunity 1: Educators Define the Rights.. As a teacher, you’re the one who needs to identify a scale for your own students. There are universal digital rights they should be aware of: They can speak their minds. They can show their creations to the world. They have the right to timely and correct information. They have the right to create an online persona. They have the right to ask for data protection..

Scene 26 (18m 15s)

Challenge 2: Responsibilities are Time Consuming to Teach..

Scene 27 (18m 46s)

Opportunity 2: Students Love the Internet.. As a teacher, you have a responsibility to help your students gain the skills to participate in the online community, communicate with others, and consume and create high-quality digital content. M ost students are thrilled to learn about anything related to the Internet, so they will probably be eager to learn these things..

Scene 28 (19m 20s)

Audio Recording Sep 28, 2022 at 9:48:54 PM. Strategies to Resolve Cyberbullying.

Scene 29 (20m 27s)

Audio Recording Sep 28, 2022 at 9:53:08 PM. Strategies to Resolve Cyberbullying.

Scene 30 (21m 2s)

Audio Recording Sep 28, 2022 at 9:54:08 PM. Strategies to Resolve Cyberbullying.

Scene 31 (21m 50s)

Audio Recording Sep 28, 2022 at 9:54:58 PM. Strategies to Resolve Cyberbullying.

Scene 32 (22m 29s)

Audio Recording Sep 28, 2022 at 9:58:41 PM. RESOURCES.

Scene 33 (23m 17s)

Audio Recording Sep 28, 2022 at 9:58:41 PM. RESOURCES.