Cyber-Safety and Digital Citizenship

2,592 views
2,482 views

Published on

Presentation given at Pantego Christian Academy by the PCA Technology Department to middle and high school students during their enrichment series. Principles covered include: Digital Golden Rule, Digital Consciousness, and Personal Security in the Global Village

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,592
On SlideShare
0
From Embeds
0
Number of Embeds
1,961
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cyber-Safety and Digital Citizenship

  1. 1. Finally brothers, whatever istrue, whatever is noble, whatever isright, whatever is pure, whatever islovely, whatever is admirable – if thereis anything excellent or worthy ofpraise, think on these things.Phil. 4:8
  2. 2. Physical Safety – freedom from physical harmPsychological Safety – freedom from cruelty, harassment, exposure to potentially disturbing materialReputational Safety – freedom from unwanted social or professional consequences that could affect a careerIdentity or Property Safety – freedom from theft of identity and property
  3. 3.  It can be Public and Permanent You have no control who sees it and what they do with it Information can be copied, pasted and modified It may not be received in the way it was intended Unlike face to face when tone, expression give clues, there are none with the net
  4. 4.  Stranger danger Viewing inappropriate content Posting inappropriate content Cyber-bullying Privacy and reputation Online addiction Online inappropriate activities Device security
  5. 5.  Like it or not, personal information sites continue to be more accurate, dig deeper and reveal more and more of your digital life These entities gather information about you, your digital activities and your contacts
  6. 6.  Lost in the rapid progress of technology is a consistent, safe code of use Most digital users do not realize how quickly their online activities can be public and permanent
  7. 7.  Poor digital decision-making starts in the mind of the user Abusing technology, such as sexting and cyber-bullying are the effects of poor digital choices There will be consequences that usually creates a chain reaction that is very difficult to take back
  8. 8.  Development of a “Digital Consciousness” Golden Rule for the 21st century“Develop and maintain a mindset that you are preparedfor your digital actions to be “public and permanent” Realize that you must operate powerful digital tools and technologies with the same preventative mindset that you would use for other things like fire or the automobile This mindset would have you evaluate risk vs. reward before you post information
  9. 9.  Report: Teen gets 15 years for Facebook blackmail Nude picture on phone lost in McDonald’s ends up online Sexting in Maryland school gets student expelled Teen sentenced to 12 months in jail for sexual bullying on Facebook Weiner resigns after sexting scandal
  10. 10.  Provide you with information necessary to understand that you are accountable and responsible for maintaining a Digital Consciousness
  11. 11. Concerns: People may not be who they say they are so have a parent approve anyone you meet online before you talk to them If the conversation turns to sex or starts to make you uncomfortable, get off immediately If someone tries to meet you, contact an adult immediately Never meet up with someone you first meet online If you must take a parent or group of friends and meet in a very public place
  12. 12.  Your online life is a reflection of you Insist that you and people around you are treated respectfully Respect other people’s digital property Stuff you created belongs to you and you should control what is done with it Be original or cite your sources Have your work reflect excellence
  13. 13.  Protect your passwords Create secure passwords Use phrases that are easy to remember but hard to guess Don’t sue the same password for multiple sites
  14. 14.  Make sure that you have security software Be careful of WiFi hotspots – hotel lobbies, airports, etc. Don’t download anything from a source you don’t trust Always back up your data
  15. 15.  It’s up to you to control what other people know about you If it’s private, don’t post it online, even email Anything can be copied, pasted and forwarded Once it is posted, you cannot take it back Don’t post information that could get you in trouble now or in the future
  16. 16.  Do not give out personal informationName Where you livePhone number BirthdateHome Address School/church You can give out impersonal informationSports teams you like favoritemovies(Other likes and dislikes)
  17. 17.  Cyber-bullying – the use of technology to harm another person in a deliberate, repeated and hostile manner Cyber-Mobbing – a form of cyber bullying involving a group sharing the same malicious mindset or intent to harm Flaming – hostile interaction between internet users usually in a internet forum or chat room Cyber-stalking – using electronic means to gather information for the purpose of harass an individual or group; false accusations, threats
  18. 18.  Sexting – The act of sending an image, video, text, etc. of a sexual nature to another individual (digital), smart phone, etc. Outing – Publically revealing personal information without the person’s consent Impersonation – pretending to be another person in order to deceive Phishing – attempting to acquire sensitive information such as usernames, passwords, credit cart information through faking authenticity Malware – deliberate attempt to send a virus crippling the computer’s ability to call up data
  19. 19.  It is against the law It could haunt you later Don’t let provocative pictures be made of you Don’t send them online, even to someone you care about If you get them, don’t share them Don’t carry them around in your phone
  20. 20.  Bullying has been around a long time but cyber-bullying is a recent phenomenon Bullies can be invisible – victims don’t know who the bully is or why they are being targeted Viral – hurtful actions of the bully can spread to a large group of people, the school, the city,.. The perception is everyone is in on the joke
  21. 21.  Don’t respond or retaliate Talk to someone you trust especially an adult Save the evidence; it could be a police matter Be a friend not a bystander Ancomm
  22. 22. I want you to be wise about what isgood and innocent about what is evil.Romans 16:10With great power comes great responsibility.Ben Parker – Spiderman
  23. 23.  Sources: “Social media snares” Safe surfing kids Safe kids.com
  24. 24. 1. Which screen name is best to have? A. cheergirl9393 B. chrisp1990 C. sandysmith999 D. horseluvr01 E. tphscheergrl
  25. 25. 2. While surfing the internet, you get an error message from your internet provider; it says that it will delete your account unless you type in your password again, should you send the information? A. Yes B. No3. If someone online tells you they are a sophomore in high school, and they are taking Driver’s Education classes, they are probably how old? A. 14 B. 15 C. 16 D. No way to tell
  26. 26. 8. While surfing the internet, you see a website that makes you feel uncomfortable. What should you do? A. Write down its name and don’t go there again B. Tell you friends so that they can avoid it to C. Tell a parent, guardian or teacher D. Shut down the computer
  27. 27. 1. I HAVE A PERSONAL SOCIAL WEBPAGE (Facebook Linked in, etc)(yes is 10 points)2. I have posted my personal phone or cell number on my social website or chat room.(yes is 10 points)3. I have posted my home address on my social website.(yes is 10 points)
  28. 28. 4. I have posted my school/work name on my social website.(yes – 10 points)5. I post current and future status updates (going on vacation, going to the mall, etc).(yes – 10 points)6. My understanding is that deleting a pictureor test file from my Digital Tools removes them permanently.(yes – 10 points)
  29. 29. 7. I have anti-virus and anti-spyware programs installed on my computer.(no – 10 points)8. I run my anti-virus and anti- spyware programs daily.(no – 10 points)9. In the digital world, I feel that I am anonymous.(yes – 20 points)10. My social website passsword is truly able to keep my contents private.(yes – 10 points)
  30. 30. 11. I have taken digital pictures/video of myself which I would not feel comfortable showing my parents.(yes – 50 points)12. I shared pictures, video, texts about myself that I would not show my parents.(yes – 100 points)13. I so and say things in front of my webcam that I would not show my parents.(yes – 50 points)
  31. 31. 14. I have, for what ever reason, harassed or bullied others through digital technology.(yes – 100 points)1-30appear to be using digitaltechnology responsibly; chances arelow of being involved in an issue40 – 120 moderately high risk ofidentity theft or exploitation130 – high risk to face a severe ordangerous situation

×