Source: Globe, Clker, http://bit.ly/1CVSonk; Stick Figure, Pixabay, http://bit.ly/1w82EoB; Joystick, Pixabay, http://bit.ly/1yH24Au; Printer, Clker, http://bit.ly/17h0Z6T; Computer Screen, Pixabay, http://bit.ly/1HIBVmi; Cell Phone, Pixabay, http://bit.ly/1KjCsxi; Laptop, Pixabay, http://bit.ly/1tGXOdg; Camera, Pixabay, http://bit.ly/1xPxu7R; Twitter Bird, Pixabay, http://bit.ly/14jU7Uv
Hello and welcome everyone. I hope you're having a great day. My name is Gino Sangiuliano, and the title of today's lesson is cyber-safety. Let's get started. I would like to begin by introducing you to the 3 C's framework. This is a model that was designed by Dr. Pruitl-Mentle, a leading researcher in the field of educational technology.
It has been adopted by numerous departments of education, and endorsed by leading safety curriculum providers. As you can see, the three components are cyber-safety, cyber-ethics, and cyber-security. Notice how the three overlap, and that's intentional.
For example, you may learn how to minimize the risk of your email being compromised, which would fall under the category of cyber-safety, but it's also important to understand the reasons that it's a wrong thing to do, which would be under the category cyber-ethics. Today we will focus on cyber-safety, a very important element of being a responsible digital citizen.
Cyber-safety is using digital and communication tools safely and responsibly, keeping personal information safe and secure, maximizing safety and minimizing security risks to private information, and just being safe on the internet.
For months, I didn't understand Twitter. Finally, I was convinced that it was a great way to stay connected with the field of education and network with some amazing people, and it has been all that and more. However, I remember the first day I set up my account I had a technology conference I was attending. When I got home, I received a message saying that so-and-so has tagged me in a photograph.
Being new Twitter, and since the individual mentioned was at the conference with me, I was intrigued and I clicked to see it. That's all it took. I was hacked. Cyber-safety in a digital world can be overwhelming simply because of the sheer number of ways that we are susceptible. Whether it's televisions, tablets, phones, printers, gaming devices, laptops, and even cameras, if it can get connected to the internet it's at risk.
We need to reiterate to students to use these tools safely and responsibly, to keep personal information safe and secure, and to maximize safety at all times and minimize risk.
Some specific ways of doing this are by showing students how to recognize the risks that exists, such as online predators and potential scams, insuring students are protecting themselves while they are using technology, encouraging students to make careful decisions when faced with new and potential dangers online situations, and to encourage students to demonstrate the safest behaviors possible and to act as role models for their peers and family.
Now, let's summarize what we covered in this lesson. We introduced the 3 C's framework, and we focused on and defined cyber-safety, we talked about practicing cyber-safety in a digital world, and we looked at ways we could help students learn how to stay safe online.
And now some food for thought. Ask your students to brainstorm a list of online dangers that they're aware of. You may be surprised at what they come up with.
To dive a little deeper and learn how to apply this information, be sure to check out the additional resources section associated with this video. This is where you'll find links targeted toward helping you discover more ways to apply this course material. As always, thanks so much for watching. We'll see you next time.
(00:00-00:10) Intro
(00:11-00:52) Three C’s Framework
(00:53-01:23) Definition of Digital-Safety
(01:24-01:57) Twitter Story
(01:58-02:30) Practicing Cyber-Safety
(02:31-02:58) Helping Students Stay Safe
(02:59-03:20) Summary
(03:21-03:48) Food For Thought