Secondary tabs

    Objectives:
    • Recognize possible safety risks of Internet use by school-age children.
    • Identify possible signs of cyberbullying.
    • Create a plan to maintain a cybersafe environment.

    Learn

    Learn

    知道

    互联网和技术已成为我们日常生活的主要部分。他们扩大了我们与他人沟通的能力。这些工具还有助于我们以更具创造性的方式教育儿童,而不是我们许多人都可以想象。学龄儿童已经与技术成长,它完全融入了许多孩子的生活方式。您程序中的许多孩子可能会在其便携式设备上使用互联网。

    The Internet has become a space for powerful learning tools, positive socializing, and a chance to engage in public life. However with these positive interactions come safety risks for school-age children. These risks include the dangers of cyberbullying (online harassment and bullying), sexual solicitation, predators, and exposure to inappropriate content. It is important to find effective ways to educate both ourselves and children about Internet safety. The first step is to learn about the risks associated with the Internet and technology.

    网络欺凌

    随着技术的兴起,欺凌通过作为即时消息,手机,电子邮件和社交网站的技术而变得常见。这种类型的欺凌可以包括(但不限于)受到威胁,骚扰,羞辱,尴尬的,或被另一个孩子的其他方式。这种类型的欺凌可以用消息,谣言或照片转发到一组接收者来轻松螺旋。

    Internet Predators

    The Internet has also become a very easy way for child predators to communicate with children anonymously through instant messaging, message boards, social networking sites, cell phones, and message boards. An online predator can be anyone and may not fit into any profile. The process by which the predator acts inappropriately toward the children is called online grooming. This process involves an adult or adults preying on the vulnerabilities of children by offering gifts or attention, befriending them, and establishing an emotional connection over a period of time. Oftentimes, the child has been chatting or communicating with this person for a while and the predator gains their trust. They will offer the child attention and affection and take advantage of their natural curiosity about sex.

    Exposure to Inappropriate Content

    虽然儿童正在使用互联网,但可能会暴露在不适当的材料上。这种材料可包括性冒犯或明确的语言或图片,暴力材料或诱人或鼓励非法活动的材料。可以通过Web浏览访问不适当的材料,在对等网络中共享,或通过电子邮件或即时消息服务发送。不恰当的内容可能对儿童有害或令人不安。这种材料可以通过意外访问。有时只需在搜索引擎中错误地拼写一个单词,或单击链接可能会将它们带到不适当的站点。在您的计划中解决此问题时,必须承认某些家庭可能会根据文化价值观和标准考虑一些不恰当的物质。孩子的年龄也是一个重要因素。

    See

    There are many ways you can keep children safe on the Internet.Watch this video to learn about a few strategies for ensuring cybersafety.

    Internet Safety

    Watch this video to learn about a few strategies for ensuring cybersafety.

    You should also be aware of warning signs that a child is experiencing trouble. There are a few warning signs that can help you identify a child who is facing online victimization, through bullying, predatory interactions, or viewing inappropriate content.

    According to the Cyberbullying Research Center, a child may be a victim of cyberbullying if he or she:

    • Unexpectedly stops using the computer
    • Appears nervous or jumpy when an instant message, text message, or email appears
    • 关于上学或外面似乎不安
    • Appears to be angry, depressed, or frustrated after using the computer
    • Avoids discussions about what he or she is doing on the computer
    • Becomes abnormally withdrawn from usual friends and family members

    对于其他在线受害,这些警告标志也可能是正确的。其他迹象表明是:过度使用计算机,互联网使用的秘密行为,当员工出现时,转到另一个网页,或者在对他们在线通信质疑时表现出激动,焦虑或内疚。儿童也可能开始使用成人或性语言。他们也可能开始穿更多透露的衣服,或者对他们的身体变得不舒服。如果您应该看到这些警告标志,请与孩子保持开放式通信。让他们知道你信任并支持他们。经常孩子们感到内疚或惭愧,所以让孩子们知道你不会评判他们,你只想让他们安全。

    Create a Cybersafe Environment

    As a child-development professional, you should develop Internet safety guidelines for your school-age program. You can perform some simple steps to ensure cybersafety.

    1. Draw up an agreement:在您的计划中与儿童建立在线规则和安全指南是一个好主意。这可以是您签署的协议,承认互联网使用规则。这些规则应在计算机站上面或周围发布,以提醒孩子他们同意的内容(参见应用部分中的示例)。发送协议的副本是一个好主意,所以父母知道在程序中使用计算机时,您的计划对其儿童的期望。
    2. Supervise computer use:The computers should be in an open area of the program space, allowing you to monitor the online activities. Additionally, comply with your program’s firewall and monitoring systems to ensure children’s safety online.
    3. 了解流行的在线活动:Be involved and regularly ask children about their online activities. Being aware of the child’s favorite sites will allow you to not only connect with the child but also help ensure that they are being safe.
    4. Inform children what personal information is and to never to give it out over the Internet:Information children should be told to avoid giving out on the Internet includes their name, address, telephone number, passwords, parents' names, the name of any club or team they are involved in at their school.

    Report Problems or Concerns

    网络欺凌在儿童中成为一个非常突出的问题。报告早期怀疑的网络欺凌变得越来越重要。每个州都有对您和您的员工非常重要的法律和程序。此外,如果您怀疑儿童捕食者,请通知儿童父母以及适当的当局很重要。如果您观察到某人观看不适当的材料或内容,可能有必要联系孩子的父母,具体取决于材料,或者只是提醒人们对计划政策的提醒以及他们同意和签署的指导方针。

    Explore

    Explore

    Complete theInternet Safetyactivity below. Read the scenarios and answers the questions that follow. Share your responses with a trainer, coach, or administrator. Then compare your answers to the suggested responses key.

    应用

    应用

    Use thisSample Internet Safety Contractto draw up your own. If you already have one for your program, compare yours to the example. Are there any things you would add or remove?

    Use the short检查表识别技术的示范应用logy and Interactive Media for Early Learning资源时,您考虑程序中介质使用的类型和频率。

    词汇表

    术语 Description
    Blog A personal journal that posted on the Web. This can be interactive and a form of social networking
    网络欺凌 A child or youth who uses the Internet or other technology (such as cell phone), to intentionally harm, harass, or threaten other children or youth. This is done in a deliberate manner and in a repeated pattern
    Cybersafe Environment Safe and responsible usage of the Internet in a program environment
    修饰 Adult befriending and establishing an emotional connection with a child or youth with the intention to exploit or lower inhibitions in preparations for sexual abuse

    Demonstrate

    Demonstrate
    Assessment:

    Q1

    What are some warning signs that a child might be a victim of cyberbullying?

    Q2

    A child wants to visit a website you have never heard of. He says he uses it at home. What should you do?

    Q3

    True or False? In a school-age program space, computers are set up in individual work stations. Tall dividers separate each workstation, and all of the workstations point different directions. Some workstations face the wall. This school-age program space is a cybersafe environment for children.

    References & Resources:

    Hinduja, Sameer & Patchin,贾斯汀w .(2015年3月). Cyberbullying Warning Signs. Cyberbullying Research Center. Retrieved fromhttps://cyberbullying.org/cyburlying- warning-signs..pdf可用AT.https://cyberbullying.org/cyburlying- warning-signs.

    国家失踪和剥削儿童中心。(N.D.)。Netsmartz研讨会:父母和监护人。可用AT.http://www.netsmartz.org

    Department of Education (ED), Department of Health and Human Services (HHS), Department of Justice (DOJ). (n.d.). Stopbullying.gov homepage. U.S. Department of Health and Human Services. Available athttp://www.stopbullying.gov