Anda di halaman 1dari 5

ARTIFACT DESCRIPTIONS: The report that I wrote was on November 28, 2012 in Huntington, WV.

Marshall University hosted a Cyber Safety Summit workshop that took place at the Memorial Student Center, BE5 from 10 a.m. to 2p.m. The meeting room was an appropriate size for this summit; it had more than enough space for everyone and comfortable chairs. Also, there was a projector and a stage for the presenters to show their PowerPoint Presentation, which made it clear for everyone to see. All the instructors for this conference were professional people and it seemed that they had a lot of experience about what they were talking about. Some of the PowerPoint had a lot of writing, which made the participants want to read what was there, but they did not have time to do that. However the PowerPoint was clear to see because the room was accessible for these kinds of big presentations. The room also had good temperature conditions. There were more than 25 participants in this summit who were motivated about the topic. The goal behind this summit was to avoid cyber intimidation and keep participants and their families safe online. Also, it was to provide information for the participants to be able to handle the dangers of social media, keep their information and computers safe, and identify scams. In addition, they became knowledgeable about how and why criminals target them through the media. The event was supported by the Department of Integrated Science & Technology, the FBI, and the Appalachian Institute of Digital Evidence. There were many presenters for this summit and each presenter had a different topic. The topics and the presenters for each topic were: Dangers of Social Media by Josh Brunt who works at Marshall University, Offenders and Victims in Child Exploitation Cases by SSA Joe Cicarelli, who works with the FBI, and Cyber Criminals: Who is Targeting You and Why by Bill Gardner. After that the participants had a lunch break for 45 minute.

The meeting was concluded with The Real World Consequences by Matt Perry, Protecting Your Kids by Tessa Cooper from the FBI and Bob Boggs from the West Virginia State Police. The last topic that the Cyber Safety Summit covered was How to Keep Safe by John Sammons, who works for Marshall University. Finally, participants were free to ask the presenters questions about everything that was related to the Cyber Safety Summit. I believe that the environment was convenient for the adult leaner. The participants in this summit were teachers and parents who care about their children and students. So, that motivated the participants about the topics because they wanted to make sure that their children or students were safe in the media world. The first session of the Cyber Safety Summit was about the Dangers of Social Media by Josh Brunt form Marshall University. He talked about what kids are doing online these days. Generally, kids between 12 to 16 years old are using Facebook, Twitter, and other kinds of chatting media. Also, the survey shows that kids spend a lot of time online without knowing the dangers of the internet. He mentioned some of the dangerous things that could happen to children and teenagers while they are online. Some of the dangers that could happen online are: identity theft, online enticement, child pornography, use of webcams, and these could ultimately impact future plans. For example, one case study told about 19 years old boy who hacked the CIA because he wanted to do something cool while he was online. The survey showed that 21% of kids between 14 to 15 years old have been engaged in online hacking. Also, another case study mentioned a good looking, manipulative, and sexually active 14 year old boy who committed a rape crime because of the internet. So, there are a lot of dangerous things caused by social media that adults need to be aware of in order to protect their children.

The second session of the Cyber Safety Summit was about Offenders and Victims in Child Exploitation Cases by Joe Cicarelli from the FBI. He talked about the offender types and their functioning and motivation rates. Also, he talked about the offenders behavior such as seeking a position that has access to victims. Also, there are some of red flags to be aware of, such as someone turning to a childrens place (for example, Chuck E. Cheeses) for emotional or physical comfort, allowing a child to engage in inappropriate behavior, and being interested in a childs relationship. After he talked about the different behaviors that offenders can have, he talked about how people should react to the situation. For example, when someone notices these behaviors, they should report to the Child Protective Serves, otherwise known as the CPS. Also, the presenter talked about some behaviors that a child may develop because of these experiences, such as depression, suicide attempts, running a way, aggressive behavior and increase in sexual behavior. The third session of the Cyber Safety Summit was Cyber Criminals: Who is Targeting You and Why by Bill Gardner, AIDE. He showed the participants an example for how criminals are targeting people on Facebook. For example, he talked about a man who traced a woman by using her Facebook information. First, the criminal saw the profile picture then searched what she was studying. The criminal ends up knowing the address of this woman from Google maps. The point is that people need to make sure that their Facebook account is private, so no one can know every detail about them. After the presenter showed the participants the example, they panicked and began to ask question about how they could avoid that from happening. After that, Matt Petty talked about The Real World Consequences by showing a video about Amanda Todd, the 15-year-old who hanged herself after being tormented by cyber bullies. In the video, she explained her problem which was using the internet in the wrong way. As a

result, she ended up killing herself because of depression. The point here is that the internet can have a bad influence among children who did not understand the consequences. The next to last topic was Protecting Your Kids in a Digital World by Bob Boggs from West Virginia State Police. Bob mentioned that in order for parents to protect their children, they need to put the computer in an open place so that it makes it easier to watch what they are doing online. Also, parents need to keep an eye on what their kids are doing online because the internet can be dangerous these days. The parents also need to educate themselves about the computer and what the children are doing online. There are online safety steps for teens that the parents need to consider. Some of these steps are: using an age appropriate email address and screen name, not leaving personal information behind, and thinking about what you post before you post it information lives forever. Also, they should never accept a friend request from someone they do not know or share passwords with friends. In addition, the parents need to make sure to keep up with the latest privacy settings on social media sites. And they need to tell their children they should not click on pop-ups. These are some of the helpful steps that parents need to keep in mind in order to protect their children online. The last topic was How to Keep Safe by John Sammons, who work at Marshall University. John Sammons explained how to keep safe by providing some steps to make ones computer safe. The first thing was to obtain an anti-virus program for the computer. Then, they needed to make sure to update this protection program when necessary. Also, they should backup everything in their computer because there is always the possibility of their computer failing. Finally, the presenters gave the participants the opportunity to ask any questions that were related to cyber safety. The participants were motivated to ask these questions because they felt that this topic was related to the most important people to them. So, they asked for more

explanation about how to be safe online. This summit was useful and helpful for the participants because of all hazards that come with access to the internet today.

Anda mungkin juga menyukai