Resources

Resources

ADMIT – A framework for developing a safe computing environment. Assess. Educate. Protect. A handout available as a PDF document:

POS CFN – What is your child typing?  Acronyms are abbreviations that are created from the first letter of each word of a phrase.  Online chat and Instant Messaging use acronyms extensively to reduce typing.  However, they are frequently used as a “code” language for communication when a parent is nearby.  POS CFN is the abbreviation for “Parent Over Shoulder, Ciao For Now”.  A list of common acronyms is available here as a PDF document: List of Common Acronyms

What is the difference between a “first party cookie” and a “downgraded cookie”?  What is a cookie?  The Internet Glossary at GetNetWise.org offers a comprehensive review of many common technology terms.  Offsite link is here: http://www.getnetwise.org/glossary

Is your child bullied on the playground, in the parking lot?  Is your child bullied online?
How do you manage cyber-bullying?  A variety of mechanisms exist to block, detect and report cyber-bullying.  The following documents, written by the Center for Safe and Responsible Internet Use, offered at www.cyberbully.org, offer tremendous insight into online threats and threat management. A Parents’ Guide to Cyberbullying and Cyberthreats, CyberbullyNOT: Stop Online Social Cruelty

Protecting Children in Cyberspace is an article written by Greg Price (Director of the Alabama Computer Forensics Institute) that was published in a 2011 edition of Healthy Horizons Magazine. It provides an overview of why individuals should be concerned about how youth use the Internet.

Alabama Legislation

Alabama Student Harassment Prevention Act (PDF)

Alabama Student Harassment Prevention Act State Department of Education Model Policy (PDF)


Cyberbullying

Bullying Statistics (bullyingstatistics.org)

STOP Cyberbullying


US Cyber Challenge – Competitions and Camps

From the USCC Website:

The U.S. Cyber Challenge develops and conducts competitions and on-site camps that enable eligible participants-including high school, college and post-graduate students-to develop their skills, gain access to advanced training and achieve recognition with scholarships, internships and jobs. USCC’s goal is to find talented Americans to fill the ranks of cyber security professionals where their skills can be of the greatest value to the nation.

Follow

Get every new post delivered to your Inbox.

Join 90 other followers

%d bloggers like this: