Predators+(Including+Information+on+Luring+and+Grooming)

=Five Smart Ideas= toc

//Thwarting Cyber Predators Lee Copeland and John Pulley http://www.edtechmag.com/k12/issues/april-may-2007/cyber-safe.html//
 * 1) Don’t put computers in the corner. Place computers that students use where teachers, librarians or administrators can pass by and see what the students are doing. Besides, you want technology to be an integral part of learning. — Ford Greene, chief of information systems and technology at Rochester (N.Y.) School District
 * 2) Educate your faculty and staff on how to respond when a teen does report a concern. One gossiped-about misstep could turn students off and keep them from reporting inappropriate behavior if they’re made to feel embarrassed in front of their peers. — Nancy Willard, executive director for the Center for Safe and Responsible Internet Use in Portland, Ore.
 * 3) Encourage parents to Google their child’s name and visit their child’s social networking page. Parents should also check their child’s blog and buddy list. Rather than leaving these open, most sites offer the capability to keep posts and buddy lists private. Some parents, however, are concerned about invading their child’s privacy. “They put these pictures and information out there for potentially millions of people to see — why not you?” — Lisa Hicks-Thomas, Virginia’s senior assistant attorney general
 * 4) Invest in a real-time identification system, which automatically searches the sexual predator databases. This ensures that all school visitors are documented and makes it easier to identify those who don’t belong on school grounds. — Marge Wessel, executive director of Doctors Charter School in Miami Shores, Fla.
 * 5) Communication from cyber predators isn’t the only concern. Many colleges and employers check social networking sites prior to admitting students or hiring employees. Photographs or posts with drinking, drug use, nudity or inappropriate language could create dire consequences down the road. — Cathy Cratty, director of student and employee assistance programs at Township High School District 113 in Highland Park, Ill.

=LINKS=

http://www.edtechmag.com/k12/issues/april-may-2007/cyber-safe.html This article is published in ed-tech on cyber safety - the section above is extracted from here

ID the Creep - an online simulation sponsored by Ad council and US national center for missing and exploited children [|http://www.idthecreep.com] “How to recognize ‘grooming’: Teach your kids” by Anne Collier (//BlogSafety// by Tech Parenting Group) http://www.blogsafety.com/thread.jspa?threadID=1200000033 • Tactics and links to other resources //Online predators: What you can do to minimize the risk// by Microsoft http://www.microsoft.com/athome/security/children/kidpred.mspx • Information on how predators work, tips for parents, and guidelines for children //Predator Tip Sheet// by i-SAFE http://xblock.isafe.org/docs/Eluding_Internet_Predators_Tip_Sheet.pdf • Tips and reminders for recognizing potential problems