Digital+Citizenship+and+Digital+Safety

media type="custom" key="3571296" =Digital Citizenship and Digital Safety=

Do you want to be one of these kids? media type="youtube" key="hHuYkT5Hsyc" height="344" width="425" I didn't think so.

=**__Problems with Digital Citizenship__**=


 * **Cyberbullying:** When a bully targets a victim using technology such as cell phones, instant messenger, interactive games, social networking, etc. Cyberbullying is more than just the traditional "playground harassment" it is something very real that kids carry with them everyday.




 * How are teens cyberbullied? There are many forms of cyberbullying which include:**
 * 1) Impersonating others online to trick people
 * 2) Spreading lies and rumors about a particular target/victim
 * 3) Tricking people into revealing personal and private information
 * 4) Sending or forwarding nasty images and texts
 * 5) Posting inappropriate pictures of a person without their consent
 * 6) Posting threats to intimidate and make others uncomfortable
 * 7) Creating numerous screen names to ensure that if they are blocked, they can always reach the victim through another means.

Other teens believe that people who cyberbully:**
 * According to a statistic from the National Crime Prevention council, when teens were asked why they thought other kids cyberbullied, 81 percent said that cyberbullies think it is funny.
 * 1) Do not think that it is a big deal
 * 2) Do not think that they will be caught in the act
 * 3) Do not consider the consequences if they are caught cyberbullying
 * 4) Are encouraged by friends
 * 5) Considers cyberbullying to be a social and acceptable norm
 * 6) Are unhappy with their own lives for personal reasons (maybe they, themselves have been cyberbullied)




 * How do victims of cyberbullying usually react? The reactions of victims who are cyberbullied range drastically**. **Some students have reacted in positive ways to cope with cyberbullying. Other teens who have had a long history of being bullied are more likely to feel angry, hurt, embarrassed, or scared...causing the victims to respond in a negative or unexpected manner. Let's see if you can identify and separate the positive reactions from the negative ones.**


 * 1) Some seek revenge on the bully
 * 2) Avoid friends and social activities
 * 3) Reciprocate with the cyberbullying
 * 4) In rare (and very frightening) cases, some victims resolve to violence (i.e. Columbine, VT, etc.)
 * 5) Deleting messages without reading them
 * 6) Blocking communication with the bully
 * 7) Talking to a close friend about it
 * 8) Reporting the incidents to an authority figure or an internet service provider


 * **Personal Safety:** Bullies are not the only online menaces while using the Internet. Since its development the Internet has been plagued with many potential problems such as**:**
 * 1) **Spam and Con Artists-** Annoying offers, pyramid schemes, obscene materials, phony products, are all methods used to extract personal information from unsuspecting e-mail accounts.
 * 2) **Online Anonymity-** Where privacy is generally an idolized and essential aspect of our culture, it is ironic that it can also be a dangerous tool used to harm others in the cyber community. Harassment can occur from individuals who lack a real sense of identity by choosing to remain anonymous online. These cyber terrorists can also give out false or misleading information to draw in victims while still conserving their own identities. Anonymous users can also be concealing their true identities: pedophiles, drug dealers, smut dealers (people who spread pornography), etc. If a person in the cyber community is not responsible with the private information being put online, then predators such as these, can use the private information to harm the user. For example, do you remember the incident at Mallet Hall this year on campus? Below is an article from the Morning Sentinel that will help you refresh your memories:

=// FARMINGTON: Police seek sex offender for questioning //=

=
//FARMINGTON -- A convicted sex offender from South Carolina is being sought for questioning after he allegedly showed up unannounced at a University of Maine at Farmington residence hall to meet a female student he met on an Internet gaming site.//======

=
//Tilton is described as 6 feet tall, 190 pounds, with dark hair and facial piercings, including one on his lip. He was last seen wearing a ski jacket, jeans and a dark green hat with small beaded chains around his wrists and fingers.//======

=
//On Friday morning, a maintenance worker cleaning the Mallett Hall lobby found two 10-inch-long knives stashed behind a couch in the area where Tilton had been sitting. The weapons were turned over to Blais.//======

=
//Blais said a campus security alert was quickly issued because it was not known whether Tilton was still in the area. The chief interviewed the female student on Friday morning and learned Tilton's real name, which enabled him to contact police in South Carolina.//======

=
//Tilton's conviction is listed on the South Carolina sex-offender registry as "criminal sexual conduct -- first degree." The site states that his victim was a 6-year-old boy and that Tilton was convicted on Feb. 13, 2006, and released from prison on May 31, 2007.//======

=
__//"People need to be more aware of Internet safety. You don't know who is on the other end and what their intentions are," he said. "No one should be publishing personal information such as their address and phone number."//__======

//bjespersen@centralmaine.com//
As you can see, by posting up any personal and private information (within a gaming room, MySpace, Facebook, instant messaging, etc.), any predator can contact you and use your information to attack and/or threaten you.




 * **Viruses:** Computer viruses are programmed software which enters another persons computer generally without any fair warning to the computer's owner and replicates itself. Other types of viruses do not spread but their intention is to severely damage a person or effects the computers ability to perform. Much like the viruses found in nature they are assumed to be deadly and must be removed carefully and by professionals as to not inflict more damage on these machines. Here are some prime examples of types of viruses that are out there right now:
 * 1) **__//Resident Viruses//__-** Viruses that generally stick to the memory in your computer, these viruses corrupt any files executed by the system (for example: renaming files, or opening programs.)
 * 2) __//**Direct Action Viruses**//__-These viruses are applied when opened, and quickly try to replicate and take control over computers.
 * 3) __//**Overwrite Viruses-**//__These viruses directly attack files, corrupting the information embedded within them and making them totally useless. The only way to truly get rid of the virus is also to delete the original content, meaning the information is lost regardless of the solution.
 * 4) __//**Boot Viruses**//__- These types of viruses target the section that has the actual hard drive information embedded onto it, and once infected a disk can be almost impossible to start-up.
 * 5) __//**Polymorphic Viruses-**//__ Viruses that hide from anti-viruses by changing the way they are encrypted for every new system they infect.
 * 6) **//__Worms-__//** A program which acts very similar to a virus, and has the ability to self replicate. Generally a anti-virus is detected and eliminated by anti-virus protection.
 * 7) __//**Trojan Horses-**//__ A program which is similar to the story of the Trojan horse, it disguises itself as a useful program or file, but once executed it continues to infect the entire system. It, unlike viruses, does not reproduce once infecting files, and can not replicate like worms.



Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. The FTC estimates that as many as 9 million Americans have their identities stolen each year. In fact, you or someone you know may have experienced some form of identity theft. The crime takes many forms. Identity thieves may: You may not find out about the theft until you review your credit report or a credit card statement and notice charges you didn’t make—or until you’re contacted by a debt collector. Identity theft is serious. While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit.
 * What is identity theft?**
 * rent an apartment
 * obtain a credit card
 * establish a telephone account in your name.

Identity theft starts with the misuse of your personally identifying information such as your name and Social Security number, credit card numbers, or other financial account information. For identity thieves, this information is as good as gold. Skilled identity thieves may use a variety of methods to get hold of your information, including:
 * How do thieves steal an identity?**
 * 1) **Dumpster Diving.** They rummage through trash looking for bills or other paper with your personal information on it.
 * 2) **Skimming.** They steal credit/debit card numbers by using a special storage device when processing your card.
 * 3) **Phishing.** They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.
 * 4) **Changing Your Address.** They divert your billing statements to another location by completing a change of address form.
 * 5) **Old-Fashioned Stealing**. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.
 * 6) **Pretexting.** They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.

Once they have your personal information, identity thieves use it in a variety of ways. Credit card fraud: Phone or utilities fraud: Bank/finance fraud: Government documents fraud: Other fraud:
 * What do thieves do with a stolen identity?**
 * They may open new credit card accounts in your name. When they use the cards and don't pay the bills, the delinquent accounts appear on your credit report.
 * They may change the billing address on your credit card so that you no longer receive bills, and then run up charges on your account. Because your bills are now sent to a different address, it may be some time before you realize there's a problem.
 * They may open a new phone or wireless account in your name, or run up charges on your existing account.
 * They may use your name to get utility services like electricity, heating, or cable TV.
 * They may create counterfeit checks using your name or account number.
 * They may open a bank account in your name and write bad checks.
 * They may clone your ATM or debit card and make electronic withdrawals your name, draining your accounts.
 * They may take out a loan in your name.
 * They may get a driver's license or official ID card issued in your name but with their picture.
 * They may use your name and Social Security number to get government benefits.
 * They may file a fraudulent tax return using your information.
 * They may get a job using your Social Security number.
 * They may rent a house or get medical services using your name.
 * They may give your personal information to police during an arrest. If they don't show up for their court date, a warrant for arrest is issued in your name.


 * How can you find out if your identity was stolen?**

The best way to find out is to monitor your accounts and bank statements each month, and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft. For more information, visit the [|Detect Identity Theft] section. Unfortunately, many consumers learn that their identity has been stolen after some damage has been done.
 * You may find out when bill collection agencies contact you for overdue debts you never incurred.
 * You may find out when you apply for a mortgage or car loan and learn that problems with your credit history are holding up the loan.
 * You may find out when you get something in the mail about an apartment you never rented, a house you never bought, or a job you never held.

Stay alert for the signs of identity theft, like:
 * What are the signs of identity theft?**
 * accounts you didn't open and debts on your accounts that you can't explain.
 * fraudulent or inaccurate information on your credit reports, including accounts and personal information, like your Social Security number, address(es), name or initials, and employers.
 * failing to receive bills or other mail. Follow up with creditors if your bills don't arrive on time. A missing bill could mean an identity thief has taken over your account and changed your billing address to cover his tracks.
 * receiving credit cards that you didn't apply for.
 * being denied credit, or being offered less favorable credit terms, like a high interest rate, for no apparent reason.
 * getting calls or letters from debt collectors or businesses about merchandise or services you didn't buy.

It's difficult to predict how long the effects of identity theft may linger. That's because it depends on many factors including the type of theft, whether the thief sold or passed your information on to other thieves, whether the thief is caught, and problems related to correcting your credit report. Victims of identity theft should monitor financial records for several months after they discover the crime. Victims should review their credit reports once every three months in the first year of the theft, and once a year thereafter. Stay alert for other signs of identity theft. Don't delay in correcting your records and contacting all companies that opened fraudulent accounts. Make the initial contact by phone, even though you will normally need to follow up in writing. The longer the inaccurate information goes uncorrected, the longer it will take to resolve the problem.
 * How long can the effects of identity theft last?**




 * **Hacking:** Hacker is a term that does not have a firm definition, most computer hackers classify themselves as expert computer programmers who have the knowledge and skill to create complex computer software and hardware. The second definition is one that is clearly defined by the media, those who make the choice to break into security networks for their own personal reasons. The second type of hacker is that which we all probably know very well, those who break into bank accounts and networks for monetary or blackmail reasons. The good news is that these hackers are punishable by federal law and can be subject to huge fines or a long stay in a penitentiary. Also the good news is that if someone admits to being a hacker, chances are they are the first type and work hard to prevent networks from being broken into and work hard to track down the real cyber criminals. They might also be able to help you upgrade your computer rather than destroying or stealing any of your files!

=Asking a Professional!!!= Interview with Dr. Grace J. Ward


 * Q. In your years as an educator, about how many cases of internet danger occurred in your school or with your students?**


 * A.** //Actually, very few. When I was an administrator, the only issue that I had with internet usage was that my students were going to the wrong sites. Back in the 1990's, the internet had no firewalls, so students would go onto sites that they were not supposed to be on. However, my school administration quickly took care of the issue through the school policy. I can remember one incident, though. I had a student that harassed another child through email. The school suspended the student for ten days.//


 * Q. In your opinion, why do you think that students cyberbully?

A.** //Usually, kids use technology to bully other children because people are not watching. It is harder for authority figures to monitor the situation because cyberbullying can occur outside of the classroom. Sometimes, students don't speak up, which makes it harder for the cyberbully to get caught. Also, with digital harassment, there is no face-to-face confrontation, which makes cyberbullies braver. I truly believe that children who cyberbully have serious problems that educators are not seeing. In most cases, the children who cyberbully have a family history of problems. Ninety percent of the time, the child is sexually abused by a family member. To avoid being hurt, or as an outlet for emotions, cyberbullying is a way for the child to gain their power and control back.//


 * Q. How does internet dangers affect the school environment?

A.** //In most cases, children no longer feel safe going to school. In these situations, kids just drop out. You could have a brilliant child in your classroom, and all of a sudden, the student is no longer coming to classes and is constantly absent. Sooner or later, if the student's teachers and administration do not take action to figure out why this child is missing school, the student tends to drop out. And of course, there are the horrific tragedies that can occur... most school shootings like Columbine or Virginia Tech result from ignored harassment. It's scary to think about, which is why educators need to address and eliminate internet dangers within the school environment.//


 * Q. Do students usually report the incidents?

A.** //It really depends on how threatening the harassment is. For example, if a cyberbully threatens a student by saying comments such as, "I know where you live", "If you tell anyone, I will kill you and your whole family", and "No one will believe you", tend to influence the child's decision to report the harassment. Sometimes, other students will pick up on the harassment and let an official know by directly making them aware of the situation, or by talking to a friend about it in front of another teacher.//


 * Q. Who should teachers report to when there is a safety issue with the internet?

A.** //The teacher should always refer back to their handbook. The handbook will have all of that information. Usually, incidents with internet safety are reported to the Assistant Principal.//


 * Q. What are the consequences for students who break school policy on these issues?

A.** //Every district has set policies that are aligned with state laws and that are approved by the school board. There is also a handbook that outlines the laws, rules, and consequences for breaking these policies. Some school boards have approved of a ten day suspension for cyberbullying, where as other schools have a zero tolerance policy. Sometimes, it depends on the incident. For example, let's compare a first and a ninth grader. If a first grader was harassing another student, the child would most likely receive a one-day suspension along with the school contacting the parents and setting up a counseling session. The reason for such a light punishment is due to the fact that the child is only a first grader... he or she is still learning right from wrong. However, after the first incident, if the child persists to harass other children, the punishments will become harsher. Every harassment case is also put on record that follows the child all the way through his or her educational career. If a ninth grader were to be caught harassing a student, then he or she would receive a greater punishment (most likely a five to ten day suspension with counseling and persistent contact with the parents). Depending on how many times a student is deliberately// disorderly, //the case can be brought to the school board where the motion to expel the student can be approved. The student can always come back to the school... However, the student must prove that she or he has changed and will not harass any student ever again.//


 * Q. How would you handle internet dangers/issues within your own classroom?

A.** //I would teach the students internet safety to avoid the consequences of what students did not know. Obviously I would tell them not to put out their private information, even on sites that they believe are confidential. I would also teach them about how to use websites properly so that there are no cases of plagiarism. In the classroom, I would always be monitoring the students when they are on the computers, so that there is no room for inappropriate access.//


 * Q. What, in your opinion, is the most dangerous internet/digital risk that occurs with children? Why?

A.** //It would definitely be the lonely kids who put up their private information on the web. Usually, these kids are looking for love and attention that they are not receiving. They need to feel wanted by somebody, so they go out on the web looking for a person. A poor, lonely sixteen year old girl could go online and meet a person and will be under the impression that she is talking to another sixteen year old girl, when really she is talking to a forty year old predator. These kids need the most attention because it is so dangerous! Predators and pedophiles stalk the web specifically looking for targets like these, and children make it so easy because they post up their private information all under the need to have somebody care about them. Look at the Farmington incident that occurred last semester! That girl was lonely and wanted someone to talk to- and she found someone on an online gaming room. She could claim that she did not want the man to come and visit her at college, but if she truly did not, then why would she ever tell him where she lived in the first place? These are the scariest and most common issues with digital safety that need to be immediately addressed within schools and at home.//


 * Q. What are some of the programs and resources that can be helpful and appropriate to teachers in the classroom?

A.** //There are a whole bunch! Point Smart. Click Safe. Internet Keep Safe Coalition. i-Safe. Kidz Privacy. National Cyber Security Alliance.// //There are hundreds of other resources that you can find on the web that will be helpful and appropriate to teachers in the classroom.//


 * Q. In your opinion, are Facebook and MySpace good** **resources and programs to exercise in a classroom?**


 * A.** //Programs like Facebook definitely have a place in the world of technology. It is a great tool to maintain classroom discussion and events. However, if a teacher were to use the software in their class, the teacher should be extremely familiar with the program. If the teacher is not good with the program, he or she opens themselves up for failure. Students can misuse Facebook and there could be potential risks such as private information being accessed. So, if a teacher wishes to use Facebook, not only does he or she have to receive permission from the school administration and parents, but the teacher also has to ensure that the Facebook class has complete privacy. The teacher should also be able to transform the Facebook software into good pedagogy, or else the students will not be gaining from the Web 2.0 technology.//


 * Q. Do you have any last comment that you would like to make about the digital world and its safety?

A.** //The shift is starting to happen. School policy on technology and its educational programs needs to be current. Schools and educators need to catch up with the technological learning of kids. People need to stop tying the teachers' hands behind their backs, or else schools will be stuck in a whole different century. If children are loving technology and the things that they can learn from it, then teachers should be able to use the internet and other Web 2.0 programs (and use them safely!) to teach the material. The technology will connect the students to real world learning and students will love to learn.//

=**__Solutions to the Risks of Digital Citizenship__**=

Now that you have heard about the problems affecting digital citizens everywhere, break up into your presentation groups and brainstorm with the class some of the potential solutions to these problems. From the information discussed you will be assigned one of the topics and create a page on Comic Life demonstrating a remedy for the situation.


 * **Guy 1 and Guy 2** || **Flippie Floppies** || **MC Hammer** || **Captain Classroom!** || **Sports Fanatics** ||
 * [|Page_1.jpg] || [|Page_1.jpg] || [[file:MC Hammer Virus2.comicdoc]] || [|Page_1.jpg] || [|Page_1.jpg] ||

Digital Bill of Rights activity:
At the end of the lesson on Digital Safety and Citizenship, each student will be asked to contribute one right or "law" that they feel should be exercised in a classroom when using technology. These "rights" and "laws" should ensure that none of the risks discussed in the wiki will ever happen in their classroom. These rules will set a firm list of guidelines that every internet user should be held accountable to.

Hanging up on the board will be a huge poster board with a marker beneath it. Going around the class, the teachers will ask the students one by one what they thought an appropriate law/right would be. Each law will be written down, by the teacher, on the poster board. After each student contributes their right/law, everyone will get up and sign the poster as a symbol of consensus on the class Digital Bill of Rights.

=__Resources__=


 * http://www.ncpc.org/cyberbullying
 * http://morningsentinel.mainetoday.com/news/local/5949190.html
 * http://education.calumet.purdue.edu/vockell/cai/Cai5/cai5dangers.htm
 * http://www.dailybulldog.com/db/images/umf_suspect_tilton.jpg
 * http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
 * http://www.uberreview.com/wp-content/uploads/cyberbully.jpg
 * http://news.research.ohiou.edu/upload_files/images/cyberbullies.jpg
 * http://www.ssa.gov/pubs/idtheft.htm
 * http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
 * http://www.buzzle.com/articles/different-types-of-computer-viruses.html
 * http://www.cgisecurity.com/questions/hacker.shtml
 * https://ecampus.umf.maine.edu/common/photos/35224.jpg
 * http://i218.photobucket.com/albums/cc303/PotPieGirl/steal-cc.jpg
 * http://wearecentralpa.com/media/jpg/identity-theft-protection2009-02-18-1234987834.jpg
 * http://greenberg-art.com/.Toons/.Toons,%20Media/qqxsgInternet%20censorship.gif
 * http://www.wisegeek.com/what-is-a-hacker.htm

//All photos pending permission//