Your SlideShare is downloading. ×
0
Cyberspace   slide show
Cyberspace   slide show
Cyberspace   slide show
Cyberspace   slide show
Cyberspace   slide show
Cyberspace   slide show
Cyberspace   slide show
Cyberspace   slide show
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyberspace slide show

220

Published on

This slide is part of a blog being put together about cybersafety.

This slide is part of a blog being put together about cybersafety.

Published in: Education, Technology, Career
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
220
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Access to film, Keeping in radio , TV, e- touch with books family and Social media friends Search Entertainment WWW enginesYou can access Discovering the www on Accessibility new laptops, information i-pad, phones,
  • 2. Brainstorm the risks involved with uploading personalinformation and surfing on the net.
  • 3.  Social networking has become one of the fastest forms of communication, with the easy access to My- space, Face book, instant messaging, e-mail and blogs, these technologies are the main targets for cyber bullying. Majority of your students have access to at least one of these social networks, and may be exposed to the risks of cyber bullying. Expose students to the risks and ensure thy have a variety of avenues to take if they fall victim of cyber bullying. Cyber bullying Alert
  • 4.  Class discussions Guest speakers (police, welfare) Interactive activities School policy on internet security Create opportunities to speak out
  • 5. How muchWhat information social mediahave you got on do you use?the World WideWeb? Who has access to your personal details?Are you a good role model for cyber safety and security?
  • 6. Get involvedResources and links to sites on educator resources page.
  • 7. http://www.cybersmart.gov.au/http://www.netsmartz.org/Educators http://www.staysmartonline. gov.au/schools_and_teach ers

×